Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("SONG, Dawn")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 16 of 16

  • Page / 1
Export

Selection :

  • and

Privacy-preserving set operationsKISSNER, Lea; SONG, Dawn.Lecture notes in computer science. 2005, pp 241-257, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 17 p.Conference Paper

Private keyword-based push and pull with applications to anonymous communication: Extended abstractKISSNER, Lea; OPREA, Alina; REITER, Michael K et al.Lecture notes in computer science. 2004, pp 16-30, issn 0302-9743, isbn 3-540-22217-0, 15 p.Conference Paper

AGVI : Automatic Generation, Verification, and Implementation of Security ProtocolsSONG, Dawn; PERRIG, Adrian; PHAN, Doantam et al.Lecture notes in computer science. 2001, pp 241-245, issn 0302-9743, isbn 3-540-42345-1Conference Paper

SIFF : A stateless internet flow filter to mitigate DDoS flooding attacksYAAR, Abraham; PERRIG, Adrian; SONG, Dawn et al.IEEE symposium on security and privacy. 2004, pp 130-143, isbn 0-7695-2136-3, 1Vol, 14 p.Conference Paper

Cloud Data Protection for the MassesSONG, Dawn; SHI, Elaine; FISCHER, Ian et al.Computer (Long Beach, CA). 2012, Vol 45, Num 1, pp 39-45, issn 0018-9162, 7 p.Article

Automatic protocol reverse-engineering: Message format extraction and field semantics inferenceCABALLERO, Juan; SONG, Dawn.Computer networks (1999). 2013, Vol 57, Num 2, pp 451-474, issn 1389-1286, 24 p.Article

TaintEraser: Protecting Sensitive Data Leaks Using Application-Level Taint Tracking : Systems Work at IntelZHU, David; JUNG, Jaeyeon; SONG, Dawn et al.Operating systems review. 2011, Vol 45, Num 1, pp 142-154, issn 0163-5980, 13 p.Article

Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous AuthenticationFRANK, Mario; BIEDERT, Ralf; MA, Eugene et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 1-2, pp 136-148, issn 1556-6013, 13 p.Article

Behavioral distance measurement using hidden markov modelsDEBIN GAO; REITER, Michael K; SONG, Dawn et al.Lecture notes in computer science. 2006, pp 19-40, issn 0302-9743, isbn 3-540-39723-X, 1Vol, 22 p.Conference Paper

Sweeper : A lightweight end-to-end system for defending against fast wormsTUCEK, Joseph; SHAN LU; CHENGDU HUANG et al.Operating systems review. 2007, Vol 41, Num 3, pp 115-128, issn 0163-5980, 14 p.Conference Paper

Behavioral distance for intrusion detectionDEBIN GAO; REITER, Michael K; SONG, Dawn et al.Lecture notes in computer science. 2006, pp 63-81, issn 0302-9743, isbn 3-540-31778-3, 1Vol, 19 p.Conference Paper

Homomorphic signature schemesJOHNSON, Robert; MOLNAR, David; SONG, Dawn et al.Lecture notes in computer science. 2002, pp 244-262, issn 0302-9743, isbn 3-540-43224-8Conference Paper

A cryptanalysis of the high-bandwidth Digital content Protection systemCROSBY, Scott; GOLDBERG, Ian; JOHNSON, Robert et al.Lecture notes in computer science. 2002, pp 192-200, issn 0302-9743, isbn 3-540-43677-4Conference Paper

Paragraph : Thwarting signature learning by training maliciouslyNEWSOME, James; KARP, Brad; SONG, Dawn et al.Lecture notes in computer science. 2006, pp 81-105, issn 0302-9743, isbn 3-540-39723-X, 1Vol, 25 p.Conference Paper

Dynamic Quarantine of Internet WormsWONG, Cynthia; CHENXI WANG; SONG, Dawn et al.International Conference on Dependable Systems and Networks. 2004, pp 73-82, isbn 0-7695-2052-9, 1Vol, 10 p.Conference Paper

Expander graphs for digital stream authentication and robust overlay networksSONG, Dawn; ZUCKERMAN, David; TYGAR, J. D et al.Proceedings - IEEE Symposium on Security and Privacy. 2002, pp 258-270, issn 1081-6011, isbn 0-7695-1543-6, 13 p.Conference Paper

  • Page / 1