A whole new look is coming
Check back again soon!
Menu
Toggle menu visibility
About
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Membership
Students
Search
Donate Today
Sign In
Search
About
USENIX Board
Staff
Good Works
Blog
Governance and Financials
USENIX Awards
USENIX Supporters
2024 Board Election
Board Meeting Minutes
Donate
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Proceedings
Author Resources
;login: Online
Writing for ;login: Online
;login: Archive
Membership
Students
Conference Fees
Student Grant Program
Search
Donate Today
Conferences
Multimedia
Conferences
Donate Today
Enter terms
Retain current filters
Search results
Title
Conference
Speaker(s)
System Administration and the Economics of Plenty
LISA '08
Tom Limoncelli
Inside DreamWorks Animation Studios: A Look at Past, Present, and Future Challenges
LISA '08
Sean Kamath, Mike Cutler
Beyond VDI: Why Thin Client Computing and Virtual Desktop Infrastructures Aren't Cutting It
LISA '08
Monica Lam
LISA Quiz Show
LISA '08
Jeremy Allison
Keynote Address Dr. Strangevote or: How I Learned to Stop Worrying and Love the Paper Ballot
USENIX Security '08
Debra Bowen
All Your iFRAMEs Point to Us
USENIX Security '08
Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose
Securing Frame Communication in Browsers
USENIX Security '08
Adam Barth, Collin Jackson, John C. Mitchell
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
USENIX Security '08
Michael Martin, Monica S. Lam
Political DDoS: Estonia and Beyond
USENIX Security '08
Jose Nazario
Lest We Remember: Cold Boot Attacks on Encryption Keys
USENIX Security '08
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten
The Practical Subtleties of Biometric Key Generation
USENIX Security '08
Lucas Ballard, Seny Kamara, Michael K. Reiter
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
USENIX Security '08
Ari Juels, Ravikanth Pappu, Bryan Parno
Building the Successful Security Software Company
USENIX Security '08
Ted Schlein
CloudAV: N-Version Antivirus in the Network Cloud
USENIX Security '08
Jon Oberheide, Evan Cooke, Farnam Jahanian
Highly Predictive Blacklisting
USENIX Security '08
Jian Zhang, Phillip Porras, Johannes Ullrich
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
USENIX Security '08
Jerry Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck
From the Casebooks of . . .
USENIX Security '08
Mark Seiden
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
USENIX Security '08
Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee
Measurement and Classification of Humans and Bots in Internet Chat
USENIX Security '08
Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
USENIX Security '08
Sam Small, Joshua Mason, Niels Provos, Adam Stubblefield
Security Analysis of Network Protocols
USENIX Security '08
John Mitchell
Reverse-Engineering a Cryptographic RFID Tag
USENIX Security '08
Starbug , Henryk Plötz
Practical Symmetric Key Cryptography on Modern Graphics Hardware
USENIX Security '08
Owen Harrison, John Waldron
An Improved Clock-skew Measurement Technique for Revealing Hidden Services
USENIX Security '08
Sebastian Zander, Steven J. Murdoch
Enterprise Security in the Brave New (Virtual) World
USENIX Security '08
Tal Garfinkel
Pages
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »