Search results
- Preventing rate-based attacks: Requirements, Architecture for a solution and Lessons from Field-Trials, Hemant Jain, 1, December, 2005
- .Efficiently Binding Data to Owners in Distributed Content-Addressable Storage Systems, Patrick Eaton, Hakim Weatherspoon, John Kubiatowicz, 3rd International IEEE Security in Storage Workshop, December, 2005
- An Efficient Algorithm for Tracking Multiple Maneuvering Targets, Songhwai Oh, Shankar Sastry, Proc. of the IEEE International Conference on Decision and Control, December, 2005
- Securing Control Systems in the Oil and Gas Infrastructure: The I3P SCADA Security Research Project, Ulf Lindqvist, 17, November, 2005
- The Common Vulnerability Scoring System (CVSS), Mike Schiffman, 10, November, 2005
- Optimal Resource Utilization in Content Distribution Networks, Yee Jiun Song, Venugopalan Ramasubramanian and Emin Gun Sirer, Cornell University, TR2005-2004, November, 2005
- A technique to study the correlation measures of binary sequences, Venkat Anantharam, November, 2005
- • Using Datalog with Binary Decision Diagrams for Program Analysis, John Whaley, Dzintars Avots, Michael Carbin, and Monica S. Lam, Third Asian Symposium on Programming Languages and Systems, November, 2005
- Reflection Analysis for Java., Benjamin Livshits, John Whaley and Monica S. Lam, Third Asian Symposium on Programming Languages and Systems, November, 2005
- Keyboard Acoustic Emanations Revisited, Li Zhuang, Feng Zhou, J. D. Tygar, To appear in Proceedings of the 12th ACM Conference on Computer and Communications Security, November, 2005
- Approximation Algorithms for K-Anonymity, Gagan Aggarwal, Tomas Feder, Krishnaram Kenthapadi, Rajeev Motwani, Rina Panigrahy, Dilys Thomas, An Zhu, Journal of Privacy Technology, November, 2005
- Radio Interferometric Geolocation, M. Maroti, B. Kusy, G.. Balogh, P. Volgyesi, A. Nadas, K. Molnar, S. Dora, A. Ledeczi, in Proc. ACM 3rd Conference on Embedded Networked Sensor Systems (SenSys'05), November, 2005
- Testimony before the House Armed Services Committee Hearing on Cyber Security, Information Assurance and Information Superiorit, Eugene H. Spafford, 27, October, 2005
- Process Detection in Secure and Reliable Computing, George Cybenko, 20, October, 2005
- Client and Feed Characteristics of RSS, A Publish-Subscribe System for Web Micronews, Hongzhou Liu, Venugopalan Ramasubramanian, Emin Gun Sirer, In Proceedings of Internet Measurement Conference (IMC), Berkeley, California, October, 2005
- Electronic Medical Records and Secure Patient Portals, Dan Masys, Vanderbilt University Medical Center, October, 2005
- Client and Feed Characteristics of RSS, A Publish-Subscribe System for Web Micronews, Hongzhou Liu, Venugopalan Ramasubramanian, Emin Gun Sirer, Proceedings of Internet Measurement Conference (IMC), Internet Measurement Conference (IMC), October, 2005
- Finding Application Errors and Security Flaws Using PQL: a Program Query Language., Michael Martin, Benjamin Livshits, Monica Lam, Object-Oriented Programming, Systems, Languages and Applications (OOPSLA), October, 2005
- Perils of Transitive Trust in the Domain Name System, Venugopalan Ramasubramanian, Emin Gun Sirer, Proceedings of Internet Measurement Conference (IMC), Internet Measurement Conference (IMC), October, 2005
- Dense Sensor Networks are also Energy-efficient: when `more' is `less', Yao-Win Hong, Birsen Sirkeci-Mergen, Anna Scaglione, and Rajit Manohar, Proceedings of MILCOM, October, 2005
- Perils of Transitive Trust in the Domain Name System, Venugopalan Ramasubramanian and Emin Gun Sirer, In Proceedings of Internet Measurement Conference (IMC), Berkeley, California, October, 2005
- Information Theory of Covert Timing Channels, Aaron B. Wagner and Venkat Anantharam, October, 2005
- No More Alice to Bob: Reality-based Models for Message Encryption and Key Management, Terence Spies, 29, September, 2005
- Too Close For Comfort: Free Speech, Privacy, and the Demonstrate Project, Ken Goldberg and Deirdre Mulligan, 15, September, 2005
- Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook ExpressPPT, Simson Garfinkle, 9, September, 2005
- TRUST:Team for Research in Ubiquitous Secure Technologies, Shankar Sastry, 1, September, 2005
- Secure Information Flow as a Safety Problem, T. Terauchi, A. Aiken, 12th International Static Analysis Symposium,, 352-367, September, 2005
- ACCURATE (A Center for Correct, Usable, Reliable, Auditable and Transparent Elections), Public Comment on the 2005 Voluntary Voting System Guidelines Submitted to the United States Election Assistance Commission, Erica Brand, Peggy Walsh, Joseph Hall, Deirdre K. Mulligan, ACCURATE, 30, September, 2005
- • DynaMine: Finding Common Error Patterns by Mining Software Revision Histories., V. Benjamin Livshits and Thomas Zimmermann, ACM SIGSOFT Symposium on the Foundations of Software Engineering, September, 2005
- Meridian: A Lightweight Network Location Service without Virtual Coordinates, Bernard Wong, Aleksandrs Slivkins, Emin Gun Sirer, Proceedings of The ACM SIGCOMM Conference, The ACM SIGCOMM Conference, August, 2005
- Finding Security Vulnerabilities in Java Applications Using Static Analysis, Benjamin Livshits, Monica Lam, 14th USENIX Security Symposium, August, 2005
- Cryptographic Voting Protocols: A Systems Perspective, Chris Karlof, Naveen Sastry, David Wagner, Proceedings of the Fourteenth USENIX Security Symposium (USENIX Security 2005), 33-50, August, 2005
- Fighting Peer-to-Peer SPAM and Decoys with Object Reputation, Kevin Walsh, Emin Gun Sirer, In Proceedings of P2PECON Workshop, Philadelphia, Pennsylvania, August, 2005
- Meridian: A Lightweight Network Location Service without Virtual, Bernard Wong, Aleksandrs Slivkins, Emin Gun Sirer, In Proceedings of The ACM SIGCOMM Conference, Philadelphia, Pennsylvania, August, 2005
- Common randomness and distributed control; a counterexample, Venkat Anantharam and Vivek Borkar, August, 2005
- A Fully Automated Distributed Multiple-Target Tracking and Identity Management Algorithm, Songhwai Oh, Inseok Hwang, Kaushik Roy, and Shankar Sastry, AIAA Guidance, Navigation, and Control Conference, August, 2005
- Fighting Peer-to-Peer SPAM and Decoys with Object Reputation, Kevin Walsh, Emin Gun Sirer, Proceedings of Workshop on the Economics of Peer-to-Peer Systems (P2PECON), Workshop on the Economics of Peer-to-Peer Systems (P2PECON), August, 2005
- TRUST:Team for Research in Ubiquitous Secure Technologies, an overview, Mary Margaret Sprinkle, 8, July, 2005
- Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware, Nathaniel Good, Rachna Dhamija, Jens Grossklags, David Thaw, Steven Aronowitz, Deirdre Mulligan, Joseph Konstan, Symposium On Usable Privacy and Security (SOUPS) 2005, Lorrie Faith Cranor, Symposium On Usable Privacy and Security (SOUPS), July, 2005
- Design and Implementation of a Single System Image Operating System for, Hongzhou Liu, Tom Roeder, Kevin Walsh, Rimon Barr, Emin Gun Sirer., In Proceedings of The International Conference on Mobile Systems, Applications, and Services (Mobisys), Seattle, Washington, June, 2005
- Design and Implementation of a Single System Image Operating System for Ad Hoc Networks, Hongzhou Liu, Tom Roeder, Kevin Walsh, Rimon Barr, Emin Gun Sirer, Proceedings of The International Conference on Mobile Systems, Applications, and Services (MobiSys), The International Conference on Mobile Systems, Applications, and Services (MobiSys), June, 2005
- Context-Sensitive Program Analysis as Database Queries, Monica Lam, John Whaley, Benjamin Livshits, Michael Martin, Dzintars Avots, Michael Carbin, Christopher Unkel, 24th SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, June, 2005
- End-to-End Availabilty Policies and Noninterference, Lantian Zheng, Andrew C. Myers, June, 2005
- Improving Software Security with A C Pointer Alias Analysis, Avots, D., Dalton, M., Livshits, V. B., and Lam, M. S, 27th International Conference on Software Engineering, May, 2005
- Sextant: A Unified Node and Event Localization Framework Using Non-Convex Constraints, Saikat Guha, Rohan Murty, Emin Gun Sirer, Proceedings of The International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc), The International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc), May, 2005
- Trickles: A Stateless Network Stack for Improved Scalability, Resilience and Flexibility, Alan Shieh, Andrew C. Myers, Emin Gun Sirer, Proceedings of Networked System Design and Implementation (NSDI), Networked System Design and Implementation (NSDI), May, 2005
- Belief in Information flow, Michael R. Clarkson, Andrew C. Myers, Journal of Computer Security, February, 2005
- Storing Our Lives Online: Expanded Email Storage Raises Complex Policy Issues, Ari Schwartz, Deirdre K. Mulligan, Indrani Monda, I/S: A Journal of Law and Policy for the Information Society, 2, January, 2005
- Network Security Architecture for Demand Response/Sensor Networks, D. K. Mulligan, D. Wagner, U. Shankar, P.A. Subrahmanyam, E. Jones, J. Lerner, On behalf of California Energy Commission, Public Interest Energy Research Group, January, 2005
- • Hierarchical Identity Based Encryption with Constant Size Ciphertext, D. Boneh, E.-J. Goh, X. Boyen, Eurocrypt, 440-456, 2005
- Evaluating 2-DNF Formulas on Ciphertexts, D. Boneh, E.-J. Goh, X. Boyen, Theory of Cryptography, 325-341, 2005
- • Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption., D. Boneh, J. Katz, RSA-CT, 87-103, 2005
- • Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys, D. Boneh, C. Gentry, B. Waters, Crypto, 258-275, 2005
- • Stronger Password Authentication Using Browser Extensions., B. Ross, C. Jackson, N. Miyake, D. Boneh, J. C. Mitchell, Usenix security, 2005
- Stealthy ciphertext, Mark Stamp, Martina Simova, Proceedings of 3rd International Conference on Internet Computing (ICOMP'05), 2005
- A One-shot Random Access Game for Wireless Networks, Hazer Inaltekin, Stephen Wicker, Symposium on Information Theory in Wirelesscom, 2005
- Saturn: A Scalable Framework for Error Detection, Yichen Xie, Alex Aiken, 32nd ACM SIGPLAN-SIGACT Sym-, 2005
- Data Mining and Privacy: An Overview, Christopher W. Clifton, Deirdre K. Mulligan, Raghu Ramakrishnan, Katherine Strandburg, Daniela Stan Raicu, 191-208, Springer US, 2005
- End-to End Availability Policies and Noninterference, Lantian Zheng, Andrew C. Myers, Cornell University, TR2005-1987, 2005
Found 59 publications.
Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.