文件名称:IEEE Symposium on Security & Privacy 2009年论文集(Proceedings of IEEE Symposium on Security & Privacy 2009)
文件大小:11.41MB
文件格式:RAR
更新时间:2013-07-13 13:47:14
论文集 计算机安全 Security&Privacy Oakland
计算机安全界的*会议IEEE Symposium on Security & Privacy 2009年论文集。关于该会议,可参看相关的介绍: Oakland:95分,全称IEEE Symposium on Security & Privacy,每年都在Oakland召开。之所以不简称S&P,是为了跟一个magazine----IEEE Security & Privacy区分开来。被认为是计算机安全的最高会议,比ACM的CCS更受尊敬。该会自称接受一切与计算机安全的文章,但我感觉其以应用型为主,对理论性的文章尤其crypto-flavor的文章非常排斥。 请注意,本论文集仅为个人整理资料,严禁用于商业或其他用途。
【文件预览】:
IEEE Symposium on Security & Privacy 2009
----Prospex_ Protocol Specification Extraction.pdf(316KB)
----Roster Page.pdf(143KB)
----Noninterference for a Practical DIFC-Based Operating System.pdf(390KB)
----Tempest in a Teapot_ Compromising Reflections Revisited.pdf(962KB)
----Privacy Weaknesses in Biometric Sketches.pdf(304KB)
----Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves.pdf(692KB)
----Title Page iii.pdf(61KB)
----Formally Certifying the Security of Digital Signature Schemes.pdf(348KB)
----An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols.pdf(342KB)
----Plaintext Recovery Attacks against SSH.pdf(266KB)
----A Logic of Secure Systems and its Application to Trusted Computing.pdf(284KB)
----Password Cracking Using Probabilistic Context-Free Grammars.pdf(548KB)
----Automatic Discovery and Quantification of Information Leaks.pdf(251KB)
----Quantifying Information Leaks in Outbound Web Traffic.pdf(300KB)
----Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors.pdf(1.14MB)
----DSybil_ Optimal Sybil-Resistance for Recommendation Systems.pdf(767KB)
----CLAMP_ Practical Prevention of Large-Scale Data Leaks.pdf(301KB)
----The Mastermind Attack on Genomic Data.pdf(447KB)
----Native Client_ A Sandbox for Portable Untrusted x86 Native Code.pdf(561KB)
----Blueprint_ Robust Prevention of Cross-site Scripting Attacks for Existing Browsers.pdf(562KB)
----Sphinx_ A Compact and Provably Secure Mix Format.pdf(381KB)
----Wirelessly Pickpocketing a Mifare Classic Card.pdf(299KB)
----Automatic Reverse Engineering of Malware Emulators.pdf(1.45MB)
----Title Page i.pdf(19KB)
----Copyright Page.pdf(105KB)
----It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions.pdf(272KB)
----Author Index.pdf(87KB)
----Exploiting Unix File-System Races via Algorithmic Complexity Attacks.pdf(300KB)
----Fingerprinting Blank Paper Using Commodity Scanners.pdf(653KB)
----Pretty-Bad-Proxy_ An Overlooked Adversary in Browsers' HTTPS Deployments.pdf(675KB)
----De-anonymizing Social Networks.pdf(315KB)