Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 601 to 625 of 899Affiliation shown is the affiliation at the time the talk was given.

Minimizing Trust Liabilities in Secure Group Messaging Infrastructures
Himanshu Khurana - University of Illinois at Urbana-Champaign

Traust and PeerTrust2: Applying Trust Negotiation to Real Systems
Marianne Winslett - University of Illinois at Urbana-Champaign

Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks
Helen J. Wang - Microsoft Research

Where's the FEEB? Effectiveness of Instruction Set Randomization
David Evans - University of Virginia

Using process labels to obtain forensic and traceback information
Florian Buchholz - Purdue University

Perturbation of Multivariable Public-key Cryptosystems
Jintai Ding - University of Cincinnati
Network Data Streaming - A Computer Scientist's Journey in Signal Processing
Jun Xu - Georgia Tech

Obfuscated Databases: Definitions and Constructions
Vitaly Shmatikov - University of Texas at Austin

GTRBAC: A Generalized Temporal Role Based Access Control Model
James Joshi - Pittsburgh University

Robustness testing - black-box testing for software security
Ari Takanen - Codenomicon Ltd.
Ways to Watch
