BibTeX records: Michael K. Reiter

download as .bib file

@inproceedings{DBLP:conf/ccs/DuanRZ18,
  author    = {Sisi Duan and
               Michael K. Reiter and
               Haibin Zhang},
  title     = {{BEAT:} Asynchronous {BFT} Made Practical},
  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  pages     = {2028--2041},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018},
  url       = {https://doi.org/10.1145/3243734.3243812},
  doi       = {10.1145/3243734.3243812},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/DuanRZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/HeorhiadiCRS18,
  author    = {Victor Heorhiadi and
               Sanjay Chandrasekaran and
               Michael K. Reiter and
               Vyas Sekar},
  title     = {Intent-driven composition of resource-management {SDN} applications},
  booktitle = {Proceedings of the 14th International Conference on emerging Networking
               EXperiments and Technologies, CoNEXT 2018, Heraklion, Greece, December
               04-07, 2018},
  pages     = {86--97},
  year      = {2018},
  crossref  = {DBLP:conf/conext/2018},
  url       = {https://doi.org/10.1145/3281411.3281431},
  doi       = {10.1145/3281411.3281431},
  timestamp = {Wed, 28 Nov 2018 07:38:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/conext/HeorhiadiCRS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/SharifBR18,
  author    = {Mahmood Sharif and
               Lujo Bauer and
               Michael K. Reiter},
  title     = {On the Suitability of Lp-Norms for Creating and Preventing Adversarial
               Examples},
  booktitle = {2018 {IEEE} Conference on Computer Vision and Pattern Recognition
               Workshops, {CVPR} Workshops 2018, Salt Lake City, UT, USA, June 18-22,
               2018},
  pages     = {1605--1613},
  year      = {2018},
  crossref  = {DBLP:conf/cvpr/2018w},
  url       = {http://openaccess.thecvf.com/content\_cvpr\_2018\_workshops/w32/html/Sharif\_On\_the\_Suitability\_CVPR\_2018\_paper.html},
  doi       = {10.1109/CVPRW.2018.00211},
  timestamp = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cvpr/SharifBR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ChenLRZ18,
  author    = {Guoxing Chen and
               Ten{-}Hwang Lai and
               Michael K. Reiter and
               Yinqian Zhang},
  title     = {Differentially Private Access Patterns for Searchable Symmetric Encryption},
  booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
               Honolulu, HI, USA, April 16-19, 2018},
  pages     = {810--818},
  year      = {2018},
  crossref  = {DBLP:conf/infocom/2018},
  url       = {https://doi.org/10.1109/INFOCOM.2018.8486381},
  doi       = {10.1109/INFOCOM.2018.8486381},
  timestamp = {Fri, 12 Oct 2018 12:47:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/ChenLRZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhouQRZ18,
  author    = {Ziqiao Zhou and
               Zhiyun Qian and
               Michael K. Reiter and
               Yinqian Zhang},
  title     = {Static Evaluation of Noninterference Using Approximate Model Counting},
  booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
               21-23 May 2018, San Francisco, California, {USA}},
  pages     = {514--528},
  year      = {2018},
  crossref  = {DBLP:conf/sp/2018},
  url       = {https://doi.org/10.1109/SP.2018.00052},
  doi       = {10.1109/SP.2018.00052},
  timestamp = {Thu, 14 Feb 2019 16:15:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/ZhouQRZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-00349,
  author    = {Mahmood Sharif and
               Sruti Bhagavatula and
               Lujo Bauer and
               Michael K. Reiter},
  title     = {Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art
               Face Recognition},
  journal   = {CoRR},
  volume    = {abs/1801.00349},
  year      = {2018},
  url       = {http://arxiv.org/abs/1801.00349},
  archivePrefix = {arXiv},
  eprint    = {1801.00349},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1801-00349},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-09653,
  author    = {Mahmood Sharif and
               Lujo Bauer and
               Michael K. Reiter},
  title     = {On the Suitability of L\({}_{\mbox{p}}\)-norms for Creating and Preventing
               Adversarial Examples},
  journal   = {CoRR},
  volume    = {abs/1802.09653},
  year      = {2018},
  url       = {http://arxiv.org/abs/1802.09653},
  archivePrefix = {arXiv},
  eprint    = {1802.09653},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1802-09653},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-01626,
  author    = {Guy Golan{-}Gueta and
               Ittai Abraham and
               Shelly Grossman and
               Dahlia Malkhi and
               Benny Pinkas and
               Michael K. Reiter and
               Dragos{-}Adrian Seredinschi and
               Orr Tamir and
               Alin Tomescu},
  title     = {{SBFT:} a Scalable Decentralized Trust Infrastructure for Blockchains},
  journal   = {CoRR},
  volume    = {abs/1804.01626},
  year      = {2018},
  url       = {http://arxiv.org/abs/1804.01626},
  archivePrefix = {arXiv},
  eprint    = {1804.01626},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1804-01626},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-00566,
  author    = {Ke Coby Wang and
               Michael K. Reiter},
  title     = {How to end password reuse on the web},
  journal   = {CoRR},
  volume    = {abs/1805.00566},
  year      = {2018},
  url       = {http://arxiv.org/abs/1805.00566},
  archivePrefix = {arXiv},
  eprint    = {1805.00566},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1805-00566},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinDRZ18,
  author    = {Chenglu Jin and
               Marten van Dijk and
               Michael K. Reiter and
               Haibin Zhang},
  title     = {PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {1171},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1171},
  timestamp = {Tue, 11 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/JinDRZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AikatACJRRSS17,
  author    = {Jay Aikat and
               Aditya Akella and
               Jeffrey S. Chase and
               Ari Juels and
               Michael K. Reiter and
               Thomas Ristenpart and
               Vyas Sekar and
               Michael M. Swift},
  title     = {Rethinking Security in the Era of Cloud Computing},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {15},
  number    = {3},
  pages     = {60--69},
  year      = {2017},
  url       = {https://doi.org/10.1109/MSP.2017.80},
  doi       = {10.1109/MSP.2017.80},
  timestamp = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/AikatACJRRSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/IsmailACKR17,
  author    = {Qatrunnada Ismail and
               Tousif Ahmed and
               Kelly Caine and
               Apu Kapadia and
               Michael K. Reiter},
  title     = {To Permit or Not to Permit, That is the Usability Question: Crowdsourcing
               Mobile Apps' Privacy Permission Settings},
  journal   = {PoPETs},
  volume    = {2017},
  number    = {4},
  pages     = {119--137},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0041},
  doi       = {10.1515/popets-2017-0041},
  timestamp = {Wed, 20 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/popets/IsmailACKR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/XiaoRZ17,
  author    = {Qiuyu Xiao and
               Michael K. Reiter and
               Yinqian Zhang},
  title     = {Personalized Pseudonyms for Servers in the Cloud},
  journal   = {PoPETs},
  volume    = {2017},
  number    = {4},
  pages     = {271--289},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0049},
  doi       = {10.1515/popets-2017-0049},
  timestamp = {Wed, 20 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/popets/XiaoRZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenZRZ17,
  author    = {Sanchuan Chen and
               Xiaokuan Zhang and
               Michael K. Reiter and
               Yinqian Zhang},
  title     = {Detecting Privileged Side-Channel Attacks in Shielded Execution with
               D{\'{e}}j{\`{a}} Vu},
  booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  pages     = {7--18},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017asia},
  url       = {https://doi.org/10.1145/3052973.3053007},
  doi       = {10.1145/3052973.3053007},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ChenZRZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/DuanRZ17,
  author    = {Sisi Duan and
               Michael K. Reiter and
               Haibin Zhang},
  title     = {Secure Causal Atomic Broadcast, Revisited},
  booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
               and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages     = {61--72},
  year      = {2017},
  crossref  = {DBLP:conf/dsn/2017},
  url       = {https://doi.org/10.1109/DSN.2017.64},
  doi       = {10.1109/DSN.2017.64},
  timestamp = {Wed, 06 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/DuanRZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuGR17,
  author    = {Weijie Liu and
               Debin Gao and
               Michael K. Reiter},
  title     = {On-Demand Time Blurring to Support Side-Channel Defense},
  booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
               in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
               Part {II}},
  pages     = {210--228},
  year      = {2017},
  crossref  = {DBLP:conf/esorics/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-66399-9\_12},
  doi       = {10.1007/978-3-319-66399-9\_12},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/LiuGR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/LiuRS17,
  author    = {Sheng Liu and
               Michael K. Reiter and
               Vyas Sekar},
  title     = {Flow Reconnaissance via Timing Attacks on {SDN} Switches},
  booktitle = {37th {IEEE} International Conference on Distributed Computing Systems,
               {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages     = {196--206},
  year      = {2017},
  crossref  = {DBLP:conf/icdcs/2017},
  url       = {https://doi.org/10.1109/ICDCS.2017.281},
  doi       = {10.1109/ICDCS.2017.281},
  timestamp = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/LiuRS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/ChiCNRS17,
  author    = {Andrew Chi and
               Robert A. Cochran and
               Marie Nesfield and
               Michael K. Reiter and
               Cynthia Sturton},
  title     = {A System to Verify Network Behavior of Known Cryptographic Clients},
  booktitle = {14th {USENIX} Symposium on Networked Systems Design and Implementation,
               {NSDI} 2017, Boston, MA, USA, March 27-29, 2017},
  pages     = {177--195},
  year      = {2017},
  crossref  = {DBLP:conf/nsdi/2017},
  url       = {https://www.usenix.org/conference/nsdi17/technical-sessions/presentation/chi},
  timestamp = {Tue, 28 Mar 2017 15:12:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/ChiCNRS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouRZ16,
  author    = {Ziqiao Zhou and
               Michael K. Reiter and
               Yinqian Zhang},
  title     = {A Software Approach to Defeating Side Channels in Last-Level Caches},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {871--882},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {https://doi.org/10.1145/2976749.2978324},
  doi       = {10.1145/2976749.2978324},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhouRZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SharifBBR16,
  author    = {Mahmood Sharif and
               Sruti Bhagavatula and
               Lujo Bauer and
               Michael K. Reiter},
  title     = {Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art
               Face Recognition},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1528--1540},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {https://doi.org/10.1145/2976749.2978392},
  doi       = {10.1145/2976749.2978392},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/SharifBBR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AndroulakiR16,
  author    = {Elli Androulaki and
               Michael K. Reiter},
  title     = {CCSW'16: 8th {ACM} Cloud Computing Security Workshop},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1882--1883},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {https://doi.org/10.1145/2976749.2990480},
  doi       = {10.1145/2976749.2990480},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AndroulakiR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AljuraidanBRB16,
  author    = {Jassim Aljuraidan and
               Lujo Bauer and
               Michael K. Reiter and
               Matthias Beckerle},
  title     = {Introducing Reputation Systems to the Economics of Outsourcing Computations
               to Rational Workers},
  booktitle = {Financial Cryptography and Data Security - 20th International Conference,
               {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
               Selected Papers},
  pages     = {60--77},
  year      = {2016},
  crossref  = {DBLP:conf/fc/2016},
  url       = {https://doi.org/10.1007/978-3-662-54970-4\_4},
  doi       = {10.1007/978-3-662-54970-4\_4},
  timestamp = {Wed, 17 May 2017 11:08:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/AljuraidanBRB16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/HeorhiadiRJRS16,
  author    = {Victor Heorhiadi and
               Shriram Rajagopalan and
               Hani Jamjoom and
               Michael K. Reiter and
               Vyas Sekar},
  title     = {Gremlin: Systematic Resilience Testing of Microservices},
  booktitle = {36th {IEEE} International Conference on Distributed Computing Systems,
               {ICDCS} 2016, Nara, Japan, June 27-30, 2016},
  pages     = {57--66},
  year      = {2016},
  crossref  = {DBLP:conf/icdcs/2016},
  url       = {https://doi.org/10.1109/ICDCS.2016.11},
  doi       = {10.1109/ICDCS.2016.11},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/HeorhiadiRJRS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/HeorhiadiRS16,
  author    = {Victor Heorhiadi and
               Michael K. Reiter and
               Vyas Sekar},
  title     = {Simplifying Software-Defined Network Optimization Using {SOL}},
  booktitle = {13th {USENIX} Symposium on Networked Systems Design and Implementation,
               {NSDI} 2016, Santa Clara, CA, USA, March 16-18, 2016},
  pages     = {223--237},
  year      = {2016},
  crossref  = {DBLP:conf/nsdi/2016},
  url       = {https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/heorhiadi},
  timestamp = {Tue, 28 Mar 2017 14:03:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/HeorhiadiRS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/AikatRJ16,
  author    = {Jay Aikat and
               Michael K. Reiter and
               Kevin Jeffay},
  title     = {Education Modules for Networking, Cloud Computing, and Security in
               Systems Courses},
  booktitle = {Proceedings of the 47th {ACM} Technical Symposium on Computing Science
               Education, Memphis, TN, USA, March 02 - 05, 2016},
  pages     = {400},
  year      = {2016},
  crossref  = {DBLP:conf/sigcse/2016},
  url       = {https://doi.org/10.1145/2839509.2850514},
  doi       = {10.1145/2839509.2850514},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcse/AikatRJ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TramerZJRR16,
  author    = {Florian Tram{\`{e}}r and
               Fan Zhang and
               Ari Juels and
               Michael K. Reiter and
               Thomas Ristenpart},
  title     = {Stealing Machine Learning Models via Prediction APIs},
  booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016.},
  pages     = {601--618},
  year      = {2016},
  crossref  = {DBLP:conf/uss/2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer},
  timestamp = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/uss/TramerZJRR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016ccsw,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Elli Androulaki and
               Michael K. Reiter},
  title     = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
               {CCSW} 2016, Vienna, Austria, October 28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2996429},
  doi       = {10.1145/2996429},
  isbn      = {978-1-4503-4572-9},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016ccsw},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChiCNRS16,
  author    = {Andrew Chi and
               Robert A. Cochran and
               Marie Nesfield and
               Michael K. Reiter and
               Cynthia Sturton},
  title     = {Server-side verification of client behavior in cryptographic protocols},
  journal   = {CoRR},
  volume    = {abs/1603.04085},
  year      = {2016},
  url       = {http://arxiv.org/abs/1603.04085},
  archivePrefix = {arXiv},
  eprint    = {1603.04085},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ChiCNRS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhouRZ16,
  author    = {Ziqiao Zhou and
               Michael K. Reiter and
               Yinqian Zhang},
  title     = {A software approach to defeating side channels in last-level caches},
  journal   = {CoRR},
  volume    = {abs/1603.05615},
  year      = {2016},
  url       = {http://arxiv.org/abs/1603.05615},
  archivePrefix = {arXiv},
  eprint    = {1603.05615},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ZhouRZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TramerZJRR16,
  author    = {Florian Tram{\`{e}}r and
               Fan Zhang and
               Ari Juels and
               Michael K. Reiter and
               Thomas Ristenpart},
  title     = {Stealing Machine Learning Models via Prediction APIs},
  journal   = {CoRR},
  volume    = {abs/1609.02943},
  year      = {2016},
  url       = {http://arxiv.org/abs/1609.02943},
  archivePrefix = {arXiv},
  eprint    = {1609.02943},
  timestamp = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/corr/TramerZJRR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/0004R15,
  author    = {Lei Wei and
               Michael K. Reiter},
  title     = {Toward practical encrypted email that supports private, regular-expression
               searches},
  journal   = {Int. J. Inf. Sec.},
  volume    = {14},
  number    = {5},
  pages     = {397--416},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10207-014-0268-3},
  doi       = {10.1007/s10207-014-0268-3},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/0004R15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ancs/MoradiQXMBR15,
  author    = {Mehrdad Moradi and
               Feng Qian and
               Qiang Xu and
               Zhuoqing Morley Mao and
               Darrell Bethea and
               Michael K. Reiter},
  title     = {Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future
               Internet Architecture},
  booktitle = {Proceedings of the Eleventh {ACM/IEEE} Symposium on Architectures
               for networking and communications systems, {ANCS} 2015, Oakland, CA,
               USA, May 7-8, 2015},
  pages     = {171--182},
  year      = {2015},
  crossref  = {DBLP:conf/ancs/2015},
  url       = {https://doi.org/10.1109/ANCS.2015.7110130},
  doi       = {10.1109/ANCS.2015.7110130},
  timestamp = {Sat, 21 Oct 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ancs/MoradiQXMBR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Reiter15,
  author    = {Michael K. Reiter},
  title     = {Side Channels in Multi-Tenant Environments},
  booktitle = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security
               Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {1},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015ccsw},
  url       = {https://doi.org/10.1145/2808425.2808426},
  doi       = {10.1145/2808425.2808426},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Reiter15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XiaoRZ15,
  author    = {Qiuyu Xiao and
               Michael K. Reiter and
               Yinqian Zhang},
  title     = {Mitigating Storage Side Channels Using Statistical Privacy Mechanisms},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {1582--1594},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {https://doi.org/10.1145/2810103.2813645},
  doi       = {10.1145/2810103.2813645},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/XiaoRZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoonSR15,
  author    = {Soo{-}Jin Moon and
               Vyas Sekar and
               Michael K. Reiter},
  title     = {Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted
               Migration},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {1595--1606},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {https://doi.org/10.1145/2810103.2813706},
  doi       = {10.1145/2810103.2813706},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/MoonSR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/IsmailAKR15,
  author    = {Qatrunnada Ismail and
               Tousif Ahmed and
               Apu Kapadia and
               Michael K. Reiter},
  title     = {Crowdsourced Exploration of Security Configurations},
  booktitle = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in
               Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23,
               2015},
  pages     = {467--476},
  year      = {2015},
  crossref  = {DBLP:conf/chi/2015},
  url       = {https://doi.org/10.1145/2702123.2702370},
  doi       = {10.1145/2702123.2702370},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/IsmailAKR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/BetheaRQXM15,
  author    = {Darrell Bethea and
               Michael K. Reiter and
               Feng Qian and
               Qiang Xu and
               Zhuoqing Morley Mao},
  title     = {{WACCO} and {LOKO:} Strong Consistency at Global Scale},
  booktitle = {{IEEE} Conference on Collaboration and Internet Computing, {CIC} 2015,
               Hangzhou, China, October 27-30, 2015},
  pages     = {130--141},
  year      = {2015},
  crossref  = {DBLP:conf/coinco/2015},
  url       = {https://doi.org/10.1109/CIC.2015.29},
  doi       = {10.1109/CIC.2015.29},
  timestamp = {Sat, 21 Oct 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/coinco/BetheaRQXM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/LiGR15,
  author    = {Peng Li and
               Debin Gao and
               Michael K. Reiter},
  title     = {Replica Placement for Availability in the Worst Case},
  booktitle = {35th {IEEE} International Conference on Distributed Computing Systems,
               {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015},
  pages     = {599--608},
  year      = {2015},
  crossref  = {DBLP:conf/icdcs/2015},
  url       = {https://doi.org/10.1109/ICDCS.2015.67},
  doi       = {10.1109/ICDCS.2015.67},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/LiGR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/AndrabiRS15,
  author    = {Sarah J. Andrabi and
               Michael K. Reiter and
               Cynthia Sturton},
  title     = {Usability of Augmented Reality for Revealing Secret Messages to Users
               but Not Their Devices},
  booktitle = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa,
               Canada, July 22-24, 2015.},
  pages     = {89--102},
  year      = {2015},
  crossref  = {DBLP:conf/soups/2015},
  url       = {https://www.usenix.org/conference/soups2015/proceedings/presentation/andrabi},
  timestamp = {Wed, 05 Apr 2017 12:53:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/soups/AndrabiRS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HeorhiadiRS15,
  author    = {Victor Heorhiadi and
               Michael K. Reiter and
               Vyas Sekar},
  title     = {Accelerating the Development of Software-Defined Network Optimization
               Applications Using {SOL}},
  journal   = {CoRR},
  volume    = {abs/1504.07704},
  year      = {2015},
  url       = {http://arxiv.org/abs/1504.07704},
  archivePrefix = {arXiv},
  eprint    = {1504.07704},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/HeorhiadiRS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jamia/KumKMRA14,
  author    = {Hye{-}Chung Kum and
               Ashok Krishnamurthy and
               Ashwin Machanavajjhala and
               Michael K. Reiter and
               Stanley C. Ahalt},
  title     = {Privacy preserving interactive record linkage {(PPIRL)}},
  journal   = {{JAMIA}},
  volume    = {21},
  number    = {2},
  pages     = {212--220},
  year      = {2014},
  url       = {https://doi.org/10.1136/amiajnl-2013-002165},
  doi       = {10.1136/amiajnl-2013-002165},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jamia/KumKMRA14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiGR14,
  author    = {Peng Li and
               Debin Gao and
               Michael K. Reiter},
  title     = {StopWatch: {A} Cloud Architecture for Timing Channel Mitigation},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {17},
  number    = {2},
  pages     = {8:1--8:28},
  year      = {2014},
  url       = {https://doi.org/10.1145/2670940},
  doi       = {10.1145/2670940},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/LiGR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangJRR14,
  author    = {Yinqian Zhang and
               Ari Juels and
               Michael K. Reiter and
               Thomas Ristenpart},
  title     = {Cross-Tenant Side-Channel Attacks in PaaS Clouds},
  booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages     = {990--1003},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014},
  url       = {https://doi.org/10.1145/2660267.2660356},
  doi       = {10.1145/2660267.2660356},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhangJRR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YenHORJ14,
  author    = {Ting{-}Fang Yen and
               Victor Heorhiadi and
               Alina Oprea and
               Michael K. Reiter and
               Ari Juels},
  title     = {An Epidemiological Study of Malware Encounters in a Large Enterprise},
  booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages     = {1117--1130},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014},
  url       = {https://doi.org/10.1145/2660267.2660330},
  doi       = {10.1145/2660267.2660330},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/YenHORJ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/LibonatiCKR14,
  author    = {Alana Libonati and
               Kelly Caine and
               Apu Kapadia and
               Michael K. Reiter},
  title     = {Defending against device theft with human notarization},
  booktitle = {10th {IEEE} International Conference on Collaborative Computing: Networking,
               Applications and Worksharing, CollaborateCom 2014, Miami, Florida,
               USA, October 22-25, 2014},
  pages     = {8--17},
  year      = {2014},
  crossref  = {DBLP:conf/colcom/2014},
  url       = {https://doi.org/10.4108/icst.collaboratecom.2014.257706},
  doi       = {10.4108/icst.collaboratecom.2014.257706},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/LibonatiCKR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/MazurekLMSBGGR14,
  author    = {Michelle L. Mazurek and
               Yuan Liang and
               William Melicher and
               Manya Sleeper and
               Lujo Bauer and
               Gregory R. Ganger and
               Nitin Gupta and
               Michael K. Reiter},
  title     = {Toward strong, usable access control for shared distributed data},
  booktitle = {Proceedings of the 12th {USENIX} conference on File and Storage Technologies,
               {FAST} 2014, Santa Clara, CA, USA, February 17-20, 2014},
  pages     = {89--103},
  year      = {2014},
  crossref  = {DBLP:conf/fast/2014},
  url       = {https://www.usenix.org/conference/fast14/technical-sessions/presentation/mazurek},
  timestamp = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fast/MazurekLMSBGGR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HeorhiadiFRS14,
  author    = {Victor Heorhiadi and
               Seyed Kaveh Fayaz and
               Michael K. Reiter and
               Vyas Sekar},
  title     = {{SNIPS:} {A} Software-Defined Approach for Scaling Intrusion Prevention
               Systems via Offloading},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  pages     = {9--29},
  year      = {2014},
  crossref  = {DBLP:conf/iciss/2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_2},
  doi       = {10.1007/978-3-319-13841-1\_2},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/HeorhiadiFRS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/KumKPRA13,
  author    = {Hye{-}Chung Kum and
               Ashok Krishnamurthy and
               Darshana Pathak and
               Michael K. Reiter and
               Stanley C. Ahalt},
  title     = {Secure Decoupled Linkage (SDLink) system for building a social genome},
  booktitle = {Proceedings of the 2013 {IEEE} International Conference on Big Data,
               6-9 October 2013, Santa Clara, CA, {USA}},
  pages     = {7--11},
  year      = {2013},
  crossref  = {DBLP:conf/bigdataconf/2013},
  url       = {https://doi.org/10.1109/BigData.2013.6691789},
  doi       = {10.1109/BigData.2013.6691789},
  timestamp = {Wed, 20 Feb 2019 16:54:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/bigdataconf/KumKPRA13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangR13,
  author    = {Yinqian Zhang and
               Michael K. Reiter},
  title     = {D{\"{u}}ppel: retrofitting commodity operating systems to mitigate
               cache side channels in the cloud},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {827--838},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013},
  url       = {https://doi.org/10.1145/2508859.2516741},
  doi       = {10.1145/2508859.2516741},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhangR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/FayazbakhshRS13,
  author    = {Seyed Kaveh Fayazbakhsh and
               Michael K. Reiter and
               Vyas Sekar},
  title     = {Verifiable network function outsourcing: requirements, challenges,
               and roadmap},
  booktitle = {Proceedings of the 2013 workshop on Hot topics in middleboxes and
               network function virtualization, HotMiddlebox 2013, Santa Barbara,
               California, USA, December 9, 2013},
  pages     = {25--30},
  year      = {2013},
  crossref  = {DBLP:conf/conext/2013hotmiddlebox},
  url       = {https://doi.org/10.1145/2535828.2535831},
  doi       = {10.1145/2535828.2535831},
  timestamp = {Tue, 06 Nov 2018 16:58:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/conext/FayazbakhshRS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiGR13,
  author    = {Peng Li and
               Debin Gao and
               Michael K. Reiter},
  title     = {Mitigating access-driven timing channels in clouds using StopWatch},
  booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
               Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  pages     = {1--12},
  year      = {2013},
  crossref  = {DBLP:conf/dsn/2013},
  url       = {https://doi.org/10.1109/DSN.2013.6575299},
  doi       = {10.1109/DSN.2013.6575299},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/LiGR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/0004R13,
  author    = {Lei Wei and
               Michael K. Reiter},
  title     = {Ensuring File Authenticity in Private {DFA} Evaluation on Encrypted
               Files in the Cloud},
  booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
               in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  pages     = {147--163},
  year      = {2013},
  crossref  = {DBLP:conf/esorics/2013},
  url       = {https://doi.org/10.1007/978-3-642-40203-6\_9},
  doi       = {10.1007/978-3-642-40203-6\_9},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/0004R13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CochranR13,
  author    = {Robert A. Cochran and
               Michael K. Reiter},
  title     = {Toward Online Verification of Client Behavior in Distributed Applications},
  booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS}
               2013, San Diego, California, USA, February 24-27, 2013},
  year      = {2013},
  crossref  = {DBLP:conf/ndss/2013},
  url       = {https://www.ndss-symposium.org/ndss2013/toward-online-verification-client-behavior-distributed-applications},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/CochranR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BauerCKMRSU13,
  author    = {Lujo Bauer and
               Lorrie Faith Cranor and
               Saranga Komanduri and
               Michelle L. Mazurek and
               Michael K. Reiter and
               Manya Sleeper and
               Blase Ur},
  title     = {The post anachronism: the temporal dimension of facebook privacy},
  booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages     = {1--12},
  year      = {2013},
  crossref  = {DBLP:conf/wpes/2013},
  url       = {https://doi.org/10.1145/2517840.2517859},
  doi       = {10.1145/2517840.2517859},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/BauerCKMRSU13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Coull0YMR12,
  author    = {Scott E. Coull and
               Andrew M. White and
               Ting{-}Fang Yen and
               Fabian Monrose and
               Michael K. Reiter},
  title     = {Understanding domain registration abuses},
  journal   = {Computers {\&} Security},
  volume    = {31},
  number    = {7},
  pages     = {806--815},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.cose.2012.05.005},
  doi       = {10.1016/j.cose.2012.05.005},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/Coull0YMR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YavuzNR12,
  author    = {Attila Altay Yavuz and
               Peng Ning and
               Michael K. Reiter},
  title     = {{BAF} and {FI-BAF:} Efficient and Publicly Verifiable Cryptographic
               Schemes for Secure Logging in Resource-Constrained Systems},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {15},
  number    = {2},
  pages     = {9:1--9:28},
  year      = {2012},
  url       = {https://doi.org/10.1145/2240276.2240280},
  doi       = {10.1145/2240276.2240280},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/YavuzNR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tos/Abd-El-MalekWCSGGR12,
  author    = {Michael Abd{-}El{-}Malek and
               Matthew Wachs and
               James Cipar and
               Karan Sanghi and
               Gregory R. Ganger and
               Garth A. Gibson and
               Michael K. Reiter},
  title     = {File system virtual appliances: Portable file system implementations},
  journal   = {{TOS}},
  volume    = {8},
  number    = {3},
  pages     = {9:1--9:26},
  year      = {2012},
  url       = {https://doi.org/10.1145/2339118.2339120},
  doi       = {10.1145/2339118.2339120},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tos/Abd-El-MalekWCSGGR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangJRR12,
  author    = {Yinqian Zhang and
               Ari Juels and
               Michael K. Reiter and
               Thomas Ristenpart},
  title     = {Cross-VM side channels and their use to extract private keys},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {305--316},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {https://doi.org/10.1145/2382196.2382230},
  doi       = {10.1145/2382196.2382230},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhangJRR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/KlempererLMSUBCGR12,
  author    = {Peter F. Klemperer and
               Yuan Liang and
               Michelle L. Mazurek and
               Manya Sleeper and
               Blase Ur and
               Lujo Bauer and
               Lorrie Faith Cranor and
               Nitin Gupta and
               Michael K. Reiter},
  title     = {Tag, you can see it!: using tags for access control in photo sharing},
  booktitle = {{CHI} Conference on Human Factors in Computing Systems, {CHI} '12,
               Austin, TX, {USA} - May 05 - 10, 2012},
  pages     = {377--386},
  year      = {2012},
  crossref  = {DBLP:conf/chi/2012},
  url       = {https://doi.org/10.1145/2207676.2207728},
  doi       = {10.1145/2207676.2207728},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/KlempererLMSUBCGR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BauerLRS12,
  author    = {Lujo Bauer and
               Yuan Liang and
               Michael K. Reiter and
               Chad Spensky},
  title     = {Discovering access-control misconfigurations: new approaches and evaluation
               methodologies},
  booktitle = {Second {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages     = {95--104},
  year      = {2012},
  crossref  = {DBLP:conf/codaspy/2012},
  url       = {https://doi.org/10.1145/2133601.2133613},
  doi       = {10.1145/2133601.2133613},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/BauerLRS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/HeorhiadiRS12,
  author    = {Victor Heorhiadi and
               Michael K. Reiter and
               Vyas Sekar},
  title     = {New opportunities for load balancing in network-wide intrusion detection
               systems},
  booktitle = {Conference on emerging Networking Experiments and Technologies, CoNEXT
               '12, Nice, France - December 10 - 13, 2012},
  pages     = {361--372},
  year      = {2012},
  crossref  = {DBLP:conf/conext/2012},
  url       = {https://doi.org/10.1145/2413176.2413218},
  doi       = {10.1145/2413176.2413218},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/conext/HeorhiadiRS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/0004R12,
  author    = {Lei Wei and
               Michael K. Reiter},
  title     = {Third-Party Private {DFA} Evaluation on Encrypted Files in the Cloud},
  booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
               in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  pages     = {523--540},
  year      = {2012},
  crossref  = {DBLP:conf/esorics/2012},
  url       = {https://doi.org/10.1007/978-3-642-33167-1\_30},
  doi       = {10.1007/978-3-642-33167-1\_30},
  timestamp = {Fri, 02 Jun 2017 20:48:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/0004R12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/YavuzNR12,
  author    = {Attila Altay Yavuz and
               Peng Ning and
               Michael K. Reiter},
  title     = {Efficient, Compromise Resilient and Append-Only Cryptographic Schemes
               for Secure Audit Logging},
  booktitle = {Financial Cryptography and Data Security - 16th International Conference,
               {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
               Selected Papers},
  pages     = {148--163},
  year      = {2012},
  crossref  = {DBLP:conf/fc/2012},
  url       = {https://doi.org/10.1007/978-3-642-32946-3\_12},
  doi       = {10.1007/978-3-642-32946-3\_12},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/YavuzNR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/SekarERRS12,
  author    = {Vyas Sekar and
               Norbert Egi and
               Sylvia Ratnasamy and
               Michael K. Reiter and
               Guangyu Shi},
  title     = {Design and Implementation of a Consolidated Middlebox Architecture},
  booktitle = {Proceedings of the 9th {USENIX} Symposium on Networked Systems Design
               and Implementation, {NSDI} 2012, San Jose, CA, USA, April 25-27, 2012},
  pages     = {323--336},
  year      = {2012},
  crossref  = {DBLP:conf/nsdi/2012},
  url       = {https://www.usenix.org/conference/nsdi12/technical-sessions/presentation/sekar},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/SekarERRS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/YenR12,
  author    = {Ting{-}Fang Yen and
               Michael K. Reiter},
  title     = {Revisiting Botnet Models and Their Implications for Takedown Strategies},
  booktitle = {Principles of Security and Trust - First International Conference,
               {POST} 2012, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
               - April 1, 2012, Proceedings},
  pages     = {249--268},
  year      = {2012},
  crossref  = {DBLP:conf/post/2012},
  url       = {https://doi.org/10.1007/978-3-642-28641-4\_14},
  doi       = {10.1007/978-3-642-28641-4\_14},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/YenR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/VanieaBCR12,
  author    = {Kami Vaniea and
               Lujo Bauer and
               Lorrie Faith Cranor and
               Michael K. Reiter},
  title     = {Out of sight, out of mind: Effects of displaying access-control information
               near the item it controls},
  booktitle = {Tenth Annual International Conference on Privacy, Security and Trust,
               {PST} 2012, Paris, France, July 16-18, 2012},
  pages     = {128--136},
  year      = {2012},
  crossref  = {DBLP:conf/pst/2012},
  url       = {https://doi.org/10.1109/PST.2012.6297929},
  doi       = {10.1109/PST.2012.6297929},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pst/VanieaBCR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BauerGR11,
  author    = {Lujo Bauer and
               Scott Garriss and
               Michael K. Reiter},
  title     = {Detecting and resolving policy misconfigurations in access-control
               systems},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {14},
  number    = {1},
  pages     = {2:1--2:28},
  year      = {2011},
  url       = {https://doi.org/10.1145/1952982.1952984},
  doi       = {10.1145/1952982.1952984},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/BauerGR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiuNR11,
  author    = {Yao Liu and
               Peng Ning and
               Michael K. Reiter},
  title     = {False data injection attacks against state estimation in electric
               power grids},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {14},
  number    = {1},
  pages     = {13:1--13:33},
  year      = {2011},
  url       = {https://doi.org/10.1145/1952982.1952995},
  doi       = {10.1145/1952982.1952995},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/LiuNR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BetheaCR11,
  author    = {Darrell Bethea and
               Robert A. Cochran and
               Michael K. Reiter},
  title     = {Server-side verification of client behavior in online games},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {14},
  number    = {4},
  pages     = {32:1--32:27},
  year      = {2011},
  url       = {https://doi.org/10.1145/2043628.2043633},
  doi       = {10.1145/2043628.2043633},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/BetheaCR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WeiCR11,
  author    = {Lei Wei and
               Scott E. Coull and
               Michael K. Reiter},
  title     = {Bounded vector signatures and their applications},
  booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
               2011},
  pages     = {277--285},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011asia},
  url       = {https://doi.org/10.1145/1966913.1966949},
  doi       = {10.1145/1966913.1966949},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/WeiCR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ReederBCRV11,
  author    = {Robert W. Reeder and
               Lujo Bauer and
               Lorrie Faith Cranor and
               Michael K. Reiter and
               Kami Vaniea},
  title     = {More than skin deep: measuring effects of the underlying model on
               access-control system usability},
  booktitle = {Proceedings of the International Conference on Human Factors in Computing
               Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
  pages     = {2065--2074},
  year      = {2011},
  crossref  = {DBLP:conf/chi/2011},
  url       = {https://doi.org/10.1145/1978942.1979243},
  doi       = {10.1145/1978942.1979243},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/ReederBCRV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HuangMR11,
  author    = {Xin Huang and
               Fabian Monrose and
               Michael K. Reiter},
  title     = {Amplifying limited expert input to sanitize large network traces},
  booktitle = {Proceedings of the 2011 {IEEE/IFIP} International Conference on Dependable
               Systems and Networks, {DSN} 2011, Hong Kong, China, June 27-30 2011},
  pages     = {494--505},
  year      = {2011},
  crossref  = {DBLP:conf/dsn/2011},
  url       = {https://doi.org/10.1109/DSN.2011.5958262},
  doi       = {10.1109/DSN.2011.5958262},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/HuangMR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/SekarRRES11,
  author    = {Vyas Sekar and
               Sylvia Ratnasamy and
               Michael K. Reiter and
               Norbert Egi and
               Guangyu Shi},
  title     = {The middlebox manifesto: enabling innovation in middlebox deployment},
  booktitle = {Tenth {ACM} Workshop on Hot Topics in Networks (HotNets-X), {HOTNETS}
               '11, Cambridge, MA, {USA} - November 14 - 15, 2011},
  pages     = {21},
  year      = {2011},
  crossref  = {DBLP:conf/hotnets/2011},
  url       = {https://doi.org/10.1145/2070562.2070583},
  doi       = {10.1145/2070562.2070583},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/SekarRRES11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LibonatiMR11,
  author    = {Alana Libonati and
               Jonathan M. McCune and
               Michael K. Reiter},
  title     = {Usability Testing a Malware-Resistant Input Mechanism},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
               2011},
  year      = {2011},
  crossref  = {DBLP:conf/ndss/2011},
  url       = {http://www.isoc.org/isoc/conferences/ndss/11/pdf/8\_3.pdf},
  timestamp = {Wed, 31 Aug 2011 14:05:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/LibonatiMR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangJOR11,
  author    = {Yinqian Zhang and
               Ari Juels and
               Alina Oprea and
               Michael K. Reiter},
  title     = {HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis},
  booktitle = {32nd {IEEE} Symposium on Security and Privacy, S{\&}P 2011, 22-25
               May 2011, Berkeley, California, {USA}},
  pages     = {313--328},
  year      = {2011},
  crossref  = {DBLP:conf/sp/2011},
  url       = {https://doi.org/10.1109/SP.2011.31},
  doi       = {10.1109/SP.2011.31},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/ZhangJOR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiCR11,
  author    = {Lei Wei and
               Scott E. Coull and
               Michael K. Reiter},
  title     = {Bounded Vector Signatures and their Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {117},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/117},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WeiCR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangR10,
  author    = {XiaoFeng Wang and
               Michael K. Reiter},
  title     = {Using Web-Referral Architectures to Mitigate Denial-of-Service Threats},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {7},
  number    = {2},
  pages     = {203--216},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2008.56},
  doi       = {10.1109/TDSC.2008.56},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/WangR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangMR10,
  author    = {Yinqian Zhang and
               Fabian Monrose and
               Michael K. Reiter},
  title     = {The security of modern password expiration: an algorithmic framework
               and empirical analysis},
  booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages     = {176--186},
  year      = {2010},
  crossref  = {DBLP:conf/ccs/2010},
  url       = {https://doi.org/10.1145/1866307.1866328},
  doi       = {10.1145/1866307.1866328},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhangMR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/MazurekABGIJLLOSSVBCGR10,
  author    = {Michelle L. Mazurek and
               J. P. Arsenault and
               Joanna Bresee and
               Nitin Gupta and
               Iulia Ion and
               Christina Johns and
               Daniel Lee and
               Yuan Liang and
               Jenny Olsen and
               Brandon Salmon and
               Richard Shay and
               Kami Vaniea and
               Lujo Bauer and
               Lorrie Faith Cranor and
               Gregory R. Ganger and
               Michael K. Reiter},
  title     = {Access control for home data sharing: evaluating social acceptability},
  booktitle = {Proceedings of the 28th International Conference on Human Factors
               in Computing Systems, {CHI} 2010, Atlanta, Georgia, USA, April 10-15,
               2010},
  pages     = {645--654},
  year      = {2010},
  crossref  = {DBLP:conf/chi/2010},
  url       = {https://doi.org/10.1145/1753326.1753421},
  doi       = {10.1145/1753326.1753421},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/MazurekABGIJLLOSSVBCGR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/SekarKGR10,
  author    = {Vyas Sekar and
               Ravishankar Krishnaswamy and
               Anupam Gupta and
               Michael K. Reiter},
  title     = {Network-wide deployment of intrusion detection and prevention systems},
  booktitle = {Proceedings of the 2010 {ACM} Conference on Emerging Networking Experiments
               and Technology, CoNEXT 2010, Philadelphia, PA, USA, November 30 -
               December 03, 2010},
  pages     = {18},
  year      = {2010},
  crossref  = {DBLP:conf/conext/2010},
  url       = {https://doi.org/10.1145/1921168.1921192},
  doi       = {10.1145/1921168.1921192},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/conext/SekarKGR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HendricksSGR10,
  author    = {James Hendricks and
               Shafeeq Sinnamohideen and
               Gregory R. Ganger and
               Michael K. Reiter},
  title     = {Zzyzx: Scalable fault tolerance through Byzantine locking},
  booktitle = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable
               Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July
               1 2010},
  pages     = {363--372},
  year      = {2010},
  crossref  = {DBLP:conf/dsn/2010},
  url       = {https://doi.org/10.1109/DSN.2010.5544297},
  doi       = {10.1109/DSN.2010.5544297},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/HendricksSGR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/YenR10,
  author    = {Ting{-}Fang Yen and
               Michael K. Reiter},
  title     = {Are Your Hosts Trading or Plotting? Telling {P2P} File-Sharing and
               Bots Apart},
  booktitle = {2010 International Conference on Distributed Computing Systems, {ICDCS}
               2010, Genova, Italy, June 21-25, 2010},
  pages     = {241--252},
  year      = {2010},
  crossref  = {DBLP:conf/icdcs/2010},
  url       = {https://doi.org/10.1109/ICDCS.2010.76},
  doi       = {10.1109/ICDCS.2010.76},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/YenR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/SekarRZ10,
  author    = {Vyas Sekar and
               Michael K. Reiter and
               Hui Zhang},
  title     = {Revisiting the case for a minimalist approach for network flow monitoring},
  booktitle = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2010, Melbourne, Australia - November 1-3, 2010},
  pages     = {328--341},
  year      = {2010},
  crossref  = {DBLP:conf/imc/2010},
  url       = {https://doi.org/10.1145/1879141.1879186},
  doi       = {10.1145/1879141.1879186},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/SekarRZ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WeiRM10,
  author    = {Lei Wei and
               Michael K. Reiter and
               Ketan Mayer{-}Patel},
  title     = {Summary-Invisible Networking: Techniques and Defenses},
  booktitle = {Information Security - 13th International Conference, {ISC} 2010,
               Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  pages     = {210--225},
  year      = {2010},
  crossref  = {DBLP:conf/isw/2010},
  url       = {https://doi.org/10.1007/978-3-642-18178-8\_19},
  doi       = {10.1007/978-3-642-18178-8\_19},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/WeiRM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BetheaCR10,
  author    = {Darrell Bethea and
               Robert A. Cochran and
               Michael K. Reiter},
  title     = {Server-side Verification of Client Behavior in Online Games},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
               2010},
  year      = {2010},
  crossref  = {DBLP:conf/ndss/2010},
  url       = {http://www.isoc.org/isoc/conferences/ndss/10/pdf/01.pdf},
  timestamp = {Wed, 08 Feb 2012 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/BetheaCR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiLGR10,
  author    = {Peng Li and
               Limin Liu and
               Debin Gao and
               Michael K. Reiter},
  title     = {On Challenges in Evaluating Malware Clustering},
  booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium,
               {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  pages     = {238--255},
  year      = {2010},
  crossref  = {DBLP:conf/raid/2010},
  url       = {https://doi.org/10.1007/978-3-642-15512-3\_13},
  doi       = {10.1007/978-3-642-15512-3\_13},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/raid/LiLGR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/replication/MeridethR10,
  author    = {Michael G. Merideth and
               Michael K. Reiter},
  title     = {Selected Results from the Latest Decade of Quorum Systems Research},
  booktitle = {Replication: Theory and Practice},
  pages     = {185--206},
  year      = {2010},
  crossref  = {DBLP:conf/replication/2010},
  url       = {https://doi.org/10.1007/978-3-642-11294-2\_10},
  doi       = {10.1007/978-3-642-11294-2\_10},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/replication/MeridethR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CoullWYMR10,
  author    = {Scott E. Coull and
               Andrew M. White and
               Ting{-}Fang Yen and
               Fabian Monrose and
               Michael K. Reiter},
  title     = {Understanding Domain Registration Abuses},
  booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
               International Information Security Conference, {SEC} 2010, Held as
               Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  pages     = {68--79},
  year      = {2010},
  crossref  = {DBLP:conf/sec/2010},
  url       = {https://doi.org/10.1007/978-3-642-15257-3\_7},
  doi       = {10.1007/978-3-642-15257-3\_7},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/CoullWYMR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/McCunePR09,
  author    = {Jonathan M. McCune and
               Adrian Perrig and
               Michael K. Reiter},
  title     = {Seeing-Is-Believing: using camera phones for human-verifiable authentication},
  journal   = {{IJSN}},
  volume    = {4},
  number    = {1/2},
  pages     = {43--56},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJSN.2009.023425},
  doi       = {10.1504/IJSN.2009.023425},
  timestamp = {Thu, 11 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijsn/McCunePR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GaoRS09,
  author    = {Debin Gao and
               Michael K. Reiter and
               Dawn Xiaodong Song},
  title     = {Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based
               Behavioral Distance},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {6},
  number    = {2},
  pages     = {96--110},
  year      = {2009},
  url       = {https://doi.org/10.1109/TDSC.2008.39},
  doi       = {10.1109/TDSC.2008.39},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/GaoRS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuRN09,
  author    = {Yao Liu and
               Michael K. Reiter and
               Peng Ning},
  title     = {False data injection attacks against state estimation in electric
               power grids},
  booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages     = {21--32},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009},
  url       = {https://doi.org/10.1145/1653662.1653666},
  doi       = {10.1145/1653662.1653666},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/LiuRN09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangWLTRD09,
  author    = {Rui Wang and
               XiaoFeng Wang and
               Zhou Li and
               Haixu Tang and
               Michael K. Reiter and
               Zheng Dong},
  title     = {Privacy-preserving genomic computation through program specialization},
  booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages     = {338--347},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009},
  url       = {https://doi.org/10.1145/1653662.1653703},
  doi       = {10.1145/1653662.1653703},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/WangWLTRD09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/BauerCRRV09,
  author    = {Lujo Bauer and
               Lorrie Faith Cranor and
               Robert W. Reeder and
               Michael K. Reiter and
               Kami Vaniea},
  title     = {Real life challenges in access-control management},
  booktitle = {Proceedings of the 27th International Conference on Human Factors
               in Computing Systems, {CHI} 2009, Boston, MA, USA, April 4-9, 2009},
  pages     = {899--908},
  year      = {2009},
  crossref  = {DBLP:conf/chi/2009},
  url       = {https://doi.org/10.1145/1518701.1518838},
  doi       = {10.1145/1518701.1518838},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/BauerCRRV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/YenHMR09,
  author    = {Ting{-}Fang Yen and
               Xin Huang and
               Fabian Monrose and
               Michael K. Reiter},
  title     = {Browser Fingerprinting from Coarse Traffic Summaries: Techniques and
               Implications},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
               2009. Proceedings},
  pages     = {157--175},
  year      = {2009},
  crossref  = {DBLP:conf/dimva/2009},
  url       = {https://doi.org/10.1007/978-3-642-02918-9\_10},
  doi       = {10.1007/978-3-642-02918-9\_10},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/YenHMR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BetheaR09,
  author    = {Darrell Bethea and
               Michael K. Reiter},
  title     = {Data Structures with Unpredictable Timing},
  booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
               in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  pages     = {456--471},
  year      = {2009},
  crossref  = {DBLP:conf/esorics/2009},
  url       = {https://doi.org/10.1007/978-3-642-04444-1\_28},
  doi       = {10.1007/978-3-642-04444-1\_28},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/BetheaR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ReiterSSZ09,
  author    = {Michael K. Reiter and
               Vyas Sekar and
               Chad Spensky and
               Zhenghao Zhang},
  title     = {Making Peer-Assisted Content Distribution Robust to Collusion Using
               Bandwidth Puzzles},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  pages     = {132--147},
  year      = {2009},
  crossref  = {DBLP:conf/iciss/2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_11},
  doi       = {10.1007/978-3-642-10772-6\_11},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/ReiterSSZ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/McCunePR09,
  author    = {Jonathan M. McCune and
               Adrian Perrig and
               Michael K. Reiter},
  title     = {Safe Passage for Passwords and Other Sensitive Data},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
               2009},
  year      = {2009},
  crossref  = {DBLP:conf/ndss/2009},
  url       = {http://www.isoc.org/isoc/conferences/ndss/09/pdf/18.pdf},
  timestamp = {Thu, 18 Jun 2009 21:33:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/McCunePR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiGR09,
  author    = {Peng Li and
               Debin Gao and
               Michael K. Reiter},
  title     = {Automatically Adapting a Trained Anomaly Detector to Software Patches},
  booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium,
               {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  pages     = {142--160},
  year      = {2009},
  crossref  = {DBLP:conf/raid/2009},
  url       = {https://doi.org/10.1007/978-3-642-04342-0\_8},
  doi       = {10.1007/978-3-642-04342-0\_8},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/raid/LiGR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BauerJRS09,
  author    = {Lujo Bauer and
               Limin Jia and
               Michael K. Reiter and
               David Swasey},
  title     = {xDomain: cross-border proofs of access},
  booktitle = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages     = {43--52},
  year      = {2009},
  crossref  = {DBLP:conf/sacmat/2009},
  url       = {https://doi.org/10.1145/1542207.1542216},
  doi       = {10.1145/1542207.1542216},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/BauerJRS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/MeridethOR09,
  author    = {Michael G. Merideth and
               Florian Oprea and
               Michael K. Reiter},
  title     = {When and How to Change Quorums on Wide Area Networks},
  booktitle = {28th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2009),
               Niagara Falls, New York, USA, September 27-30, 2009},
  pages     = {12--21},
  year      = {2009},
  crossref  = {DBLP:conf/srds/2009},
  url       = {https://doi.org/10.1109/SRDS.2009.35},
  doi       = {10.1109/SRDS.2009.35},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/MeridethOR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/WangR08,
  author    = {XiaoFeng Wang and
               Michael K. Reiter},
  title     = {A multi-layer framework for puzzle-based denial-of-service defense},
  journal   = {Int. J. Inf. Sec.},
  volume    = {7},
  number    = {4},
  pages     = {243--263},
  year      = {2008},
  url       = {https://doi.org/10.1007/s10207-007-0042-x},
  doi       = {10.1007/s10207-007-0042-x},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/WangR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangLCXRK08,
  author    = {XiaoFeng Wang and
               Zhuowei Li and
               Jong Youl Choi and
               Jun Xu and
               Michael K. Reiter and
               Chongkyung Kil},
  title     = {Fast and Black-box Exploit Detection and Signature Generation for
               Commodity Software},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {12},
  number    = {2},
  pages     = {11:1--11:35},
  year      = {2008},
  url       = {https://doi.org/10.1145/1455518.1455523},
  doi       = {10.1145/1455518.1455523},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/WangLCXRK08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ReiterS08,
  author    = {Michael K. Reiter and
               Asad Samar},
  title     = {Quiver: Consistent and Scalable Object Sharing for Edge Services},
  journal   = {{IEEE} Trans. Parallel Distrib. Syst.},
  volume    = {19},
  number    = {7},
  pages     = {878--889},
  year      = {2008},
  url       = {https://doi.org/10.1109/TPDS.2007.70790},
  doi       = {10.1109/TPDS.2007.70790},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tpds/ReiterS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/McCunePPRS08,
  author    = {Jonathan M. McCune and
               Bryan Parno and
               Adrian Perrig and
               Michael K. Reiter and
               Arvind Seshadri},
  title     = {How low can you go?: recommendations for hardware-supported minimal
               {TCB} code execution},
  booktitle = {Proceedings of the 13th International Conference on Architectural
               Support for Programming Languages and Operating Systems, {ASPLOS}
               2008, Seattle, WA, USA, March 1-5, 2008},
  pages     = {14--25},
  year      = {2008},
  crossref  = {DBLP:conf/asplos/2008},
  url       = {https://doi.org/10.1145/1346281.1346285},
  doi       = {10.1145/1346281.1346285},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asplos/McCunePPRS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BallardKMR08,
  author    = {Lucas Ballard and
               Seny Kamara and
               Fabian Monrose and
               Michael K. Reiter},
  title     = {Towards practical biometric key generation with randomized biometric
               templates},
  booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages     = {235--244},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008},
  url       = {https://doi.org/10.1145/1455770.1455801},
  doi       = {10.1145/1455770.1455801},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BallardKMR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/BauerCRRV08,
  author    = {Lujo Bauer and
               Lorrie Faith Cranor and
               Robert W. Reeder and
               Michael K. Reiter and
               Kami Vaniea},
  title     = {A user study of policy creation in a flexible access-control system},
  booktitle = {Proceedings of the 2008 Conference on Human Factors in Computing Systems,
               {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008},
  pages     = {543--552},
  year      = {2008},
  crossref  = {DBLP:conf/chi/2008},
  url       = {https://doi.org/10.1145/1357054.1357143},
  doi       = {10.1145/1357054.1357143},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/BauerCRRV08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ReederBCRBHS08,
  author    = {Robert W. Reeder and
               Lujo Bauer and
               Lorrie Faith Cranor and
               Michael K. Reiter and
               Kelli Bacon and
               Keisha How and
               Heather Strong},
  title     = {Expandable grids for visualizing and authoring computer security policies},
  booktitle = {Proceedings of the 2008 Conference on Human Factors in Computing Systems,
               {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008},
  pages     = {1473--1482},
  year      = {2008},
  crossref  = {DBLP:conf/chi/2008},
  url       = {https://doi.org/10.1145/1357054.1357285},
  doi       = {10.1145/1357054.1357285},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/ReederBCRBHS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/YenR08,
  author    = {Ting{-}Fang Yen and
               Michael K. Reiter},
  title     = {Traffic Aggregation for Malware Detection},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               5th International Conference, {DIMVA} 2008, Paris, France, July 10-11,
               2008. Proceedings},
  pages     = {207--227},
  year      = {2008},
  crossref  = {DBLP:conf/dimva/2008},
  url       = {https://doi.org/10.1007/978-3-540-70542-0\_11},
  doi       = {10.1007/978-3-540-70542-0\_11},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/YenR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiWLR08,
  author    = {Zhuowei Li and
               XiaoFeng Wang and
               Zhenkai Liang and
               Michael K. Reiter},
  title     = {{AGIS:} Towards automatic generation of infection signatures},
  booktitle = {The 38th Annual {IEEE/IFIP} International Conference on Dependable
               Systems and Networks, {DSN} 2008, June 24-27, 2008, Anchorage, Alaska,
               USA, Proceedings},
  pages     = {237--246},
  year      = {2008},
  crossref  = {DBLP:conf/dsn/2008},
  url       = {https://doi.org/10.1109/DSN.2008.4630092},
  doi       = {10.1109/DSN.2008.4630092},
  timestamp = {Thu, 07 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/LiWLR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/McCunePPRI08,
  author    = {Jonathan M. McCune and
               Bryan Parno and
               Adrian Perrig and
               Michael K. Reiter and
               Hiroshi Isozaki},
  title     = {Flicker: an execution infrastructure for tcb minimization},
  booktitle = {Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK,
               April 1-4, 2008},
  pages     = {315--328},
  year      = {2008},
  crossref  = {DBLP:conf/eurosys/2008},
  url       = {https://doi.org/10.1145/1352592.1352625},
  doi       = {10.1145/1352592.1352625},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurosys/McCunePPRI08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/GaoRS08,
  author    = {Debin Gao and
               Michael K. Reiter and
               Dawn Xiaodong Song},
  title     = {BinHunt: Automatically Finding Semantic Differences in Binary Programs},
  booktitle = {Information and Communications Security, 10th International Conference,
               {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  pages     = {238--255},
  year      = {2008},
  crossref  = {DBLP:conf/icics/2008},
  url       = {https://doi.org/10.1007/978-3-540-88625-9\_16},
  doi       = {10.1007/978-3-540-88625-9\_16},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/GaoRS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/ReiterSW08,
  author    = {Michael K. Reiter and
               Asad Samar and
               Chenxi Wang},
  title     = {Self-optimizing distributed trees},
  booktitle = {22nd {IEEE} International Symposium on Parallel and Distributed Processing,
               {IPDPS} 2008, Miami, Florida USA, April 14-18, 2008},
  pages     = {1--12},
  year      = {2008},
  crossref  = {DBLP:conf/ipps/2008},
  url       = {https://doi.org/10.1109/IPDPS.2008.4536248},
  doi       = {10.1109/IPDPS.2008.4536248},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ipps/ReiterSW08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CoullWKMR08,
  author    = {Scott E. Coull and
               Charles V. Wright and
               Angelos D. Keromytis and
               Fabian Monrose and
               Michael K. Reiter},
  title     = {Taming the Devil: Techniques for Evaluating Anonymized Network Data},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
               2008},
  year      = {2008},
  crossref  = {DBLP:conf/ndss/2008},
  url       = {http://www.isoc.org/isoc/conferences/ndss/08/papers/08\_taming\_the\_devil.pdf},
  timestamp = {Thu, 18 Jun 2009 21:33:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/CoullWKMR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/SekarRWZKA08,
  author    = {Vyas Sekar and
               Michael K. Reiter and
               Walter Willinger and
               Hui Zhang and
               Ramana Rao Kompella and
               David G. Andersen},
  title     = {cSamp: {A} System for Network-Wide Flow Monitoring},
  booktitle = {5th {USENIX} Symposium on Networked Systems Design {\&} Implementation,
               {NSDI} 2008, April 16-18, 2008, San Francisco, CA, USA, Proceedings},
  pages     = {233--246},
  year      = {2008},
  crossref  = {DBLP:conf/nsdi/2008},
  url       = {http://www.usenix.org/events/nsdi08/tech/full\_papers/sekar/sekar.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/SekarRWZKA08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/opodis/MeridethR08,
  author    = {Michael G. Merideth and
               Michael K. Reiter},
  title     = {Write Markers for Probabilistic Quorum Systems},
  booktitle = {Principles of Distributed Systems, 12th International Conference,
               {OPODIS} 2008, Luxor, Egypt, December 15-18, 2008. Proceedings},
  pages     = {5--21},
  year      = {2008},
  crossref  = {DBLP:conf/opodis/2008},
  url       = {https://doi.org/10.1007/978-3-540-92221-6\_3},
  doi       = {10.1007/978-3-540-92221-6\_3},
  timestamp = {Wed, 14 Nov 2018 10:58:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/opodis/MeridethR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CollinsR08,
  author    = {M. Patrick Collins and
               Michael K. Reiter},
  title     = {On the Limits of Payload-Oblivious Network Attack Detection},
  booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium,
               {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  pages     = {251--270},
  year      = {2008},
  crossref  = {DBLP:conf/raid/2008},
  url       = {https://doi.org/10.1007/978-3-540-87403-4\_14},
  doi       = {10.1007/978-3-540-87403-4\_14},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/CollinsR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BauerGR08,
  author    = {Lujo Bauer and
               Scott Garriss and
               Michael K. Reiter},
  title     = {Detecting and resolving policy misconfigurations in access-control
               systems},
  booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages     = {185--194},
  year      = {2008},
  crossref  = {DBLP:conf/sacmat/2008},
  url       = {https://doi.org/10.1145/1377836.1377866},
  doi       = {10.1145/1377836.1377866},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/BauerGR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BallardKR08,
  author    = {Lucas Ballard and
               Seny Kamara and
               Michael K. Reiter},
  title     = {The Practical Subtleties of Biometric Key Generation},
  booktitle = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August
               1, 2008, San Jose, CA, {USA}},
  pages     = {61--74},
  year      = {2008},
  crossref  = {DBLP:conf/uss/2008},
  url       = {http://www.usenix.org/events/sec08/tech/full\_papers/ballard/ballard.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/BallardKR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/OpreaR07,
  author    = {Florian Oprea and
               Michael K. Reiter},
  title     = {Minimizing Response Time for Quorum-System Protocols over Wide-Area
               Networks},
  booktitle = {The 37th Annual {IEEE/IFIP} International Conference on Dependable
               Systems and Networks, {DSN} 2007, 25-28 June 2007, Edinburgh, UK,
               Proceedings},
  pages     = {409--418},
  year      = {2007},
  crossref  = {DBLP:conf/dsn/2007},
  url       = {https://doi.org/10.1109/DSN.2007.66},
  doi       = {10.1109/DSN.2007.66},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/OpreaR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Reiter07,
  author    = {Michael K. Reiter},
  title     = {Trustworthy Services and the Biological Analogy},
  booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
               In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  pages     = {1},
  year      = {2007},
  crossref  = {DBLP:conf/esorics/2007},
  url       = {https://doi.org/10.1007/978-3-540-74835-9\_1},
  doi       = {10.1007/978-3-540-74835-9\_1},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/Reiter07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BauerGR07,
  author    = {Lujo Bauer and
               Scott Garriss and
               Michael K. Reiter},
  title     = {Efficient Proving for Practical Distributed Access-Control Systems},
  booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
               In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  pages     = {19--37},
  year      = {2007},
  crossref  = {DBLP:conf/esorics/2007},
  url       = {https://doi.org/10.1007/978-3-540-74835-9\_3},
  doi       = {10.1007/978-3-540-74835-9\_3},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/BauerGR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BowersBGPR07,
  author    = {Kevin D. Bowers and
               Lujo Bauer and
               Deepak Garg and
               Frank Pfenning and
               Michael K. Reiter},
  title     = {Consumable Credentials in Linear-Logic-Based Access-Control Systems},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
               2007},
  year      = {2007},
  crossref  = {DBLP:conf/ndss/2007},
  url       = {http://www.isoc.org/isoc/conferences/ndss/07/papers/consumable\_credentials.pdf},
  timestamp = {Fri, 02 Jan 2015 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/BowersBGPR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CoullWMCR07,
  author    = {Scott E. Coull and
               Charles V. Wright and
               Fabian Monrose and
               Michael P. Collins and
               Michael K. Reiter},
  title     = {Playing Devil's Advocate: Inferring Sensitive Information from Anonymized
               Network Traces},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
               2007},
  year      = {2007},
  crossref  = {DBLP:conf/ndss/2007},
  url       = {http://www.isoc.org/isoc/conferences/ndss/07/papers/playing\_devils\_advocate.pdf},
  timestamp = {Thu, 16 Apr 2009 21:25:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/CoullWMCR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/HendricksGR07,
  author    = {James Hendricks and
               Gregory R. Ganger and
               Michael K. Reiter},
  title     = {Verifying distributed erasure-coded data},
  booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2007, Portland, Oregon, USA, August
               12-15, 2007},
  pages     = {139--146},
  year      = {2007},
  crossref  = {DBLP:conf/podc/2007},
  url       = {https://doi.org/10.1145/1281100.1281122},
  doi       = {10.1145/1281100.1281122},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/podc/HendricksGR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CollinsR07,
  author    = {M. Patrick Collins and
               Michael K. Reiter},
  title     = {Hit-List Worm Detection and Bot Identification in Large Networks Using
               Protocol Graphs},
  booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium,
               {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  pages     = {276--295},
  year      = {2007},
  crossref  = {DBLP:conf/raid/2007},
  url       = {https://doi.org/10.1007/978-3-540-74320-0\_15},
  doi       = {10.1007/978-3-540-74320-0\_15},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/CollinsR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/HendricksGR07,
  author    = {James Hendricks and
               Gregory R. Ganger and
               Michael K. Reiter},
  title     = {Low-overhead byzantine fault-tolerant storage},
  booktitle = {Proceedings of the 21st {ACM} Symposium on Operating Systems Principles
               2007, {SOSP} 2007, Stevenson, Washington, USA, October 14-17, 2007},
  pages     = {73--86},
  year      = {2007},
  crossref  = {DBLP:conf/sosp/2007},
  url       = {https://doi.org/10.1145/1294261.1294269},
  doi       = {10.1145/1294261.1294269},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/HendricksGR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/BauerCRV07,
  author    = {Lujo Bauer and
               Lorrie Faith Cranor and
               Michael K. Reiter and
               Kami Vaniea},
  title     = {Lessons learned from the deployment of a smartphone-based access-control
               system},
  booktitle = {Proceedings of the 3rd Symposium on Usable Privacy and Security, {SOUPS}
               2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007},
  pages     = {64--75},
  year      = {2007},
  crossref  = {DBLP:conf/soups/2007},
  url       = {https://doi.org/10.1145/1280680.1280689},
  doi       = {10.1145/1280680.1280689},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/soups/BauerCRV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/McCunePPRS07,
  author    = {Jonathan M. McCune and
               Bryan Parno and
               Adrian Perrig and
               Michael K. Reiter and
               Arvind Seshadri},
  title     = {Minimal {TCB} Code Execution},
  booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
               May 2007, Oakland, California, {USA}},
  pages     = {267--272},
  year      = {2007},
  crossref  = {DBLP:conf/sp/2007},
  url       = {https://doi.org/10.1109/SP.2007.27},
  doi       = {10.1109/SP.2007.27},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/McCunePPRS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CoullCWMR07,
  author    = {Scott E. Coull and
               Michael P. Collins and
               Charles V. Wright and
               Fabian Monrose and
               Michael K. Reiter},
  title     = {On Web Browsing Privacy in Anonymized NetFlows},
  booktitle = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
               August 6-10, 2007},
  year      = {2007},
  crossref  = {DBLP:conf/uss/2007},
  url       = {https://www.usenix.org/conference/16th-usenix-security-symposium/web-browsing-privacy-anonymized-netflows},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/CoullCWMR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OpreaR07,
  author    = {Alina Oprea and
               Michael K. Reiter},
  title     = {Integrity Checking in Cryptographic File Systems with Constant Trusted
               Storage},
  booktitle = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
               August 6-10, 2007},
  year      = {2007},
  crossref  = {DBLP:conf/uss/2007},
  url       = {https://www.usenix.org/conference/16th-usenix-security-symposium/integrity-checking-cryptographic-file-systems-constant},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/OpreaR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/MeridethR07,
  author    = {Michael G. Merideth and
               Michael K. Reiter},
  title     = {Probabilistic Opaque Quorum Systems},
  booktitle = {Distributed Computing, 21st International Symposium, {DISC} 2007,
               Lemesos, Cyprus, September 24-26, 2007, Proceedings},
  pages     = {403--419},
  year      = {2007},
  crossref  = {DBLP:conf/wdag/2007},
  url       = {https://doi.org/10.1007/978-3-540-75142-7\_31},
  doi       = {10.1007/978-3-540-75142-7\_31},
  timestamp = {Wed, 14 Nov 2018 10:59:35 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wdag/MeridethR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XieRO06,
  author    = {Yinglian Xie and
               Michael K. Reiter and
               David R. O'Hallaron},
  title     = {Protecting Privacy in Key-Value Search Systems},
  booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
               11-15 December 2006, Miami Beach, Florida, {USA}},
  pages     = {493--504},
  year      = {2006},
  crossref  = {DBLP:conf/acsac/2006},
  url       = {https://doi.org/10.1109/ACSAC.2006.43},
  doi       = {10.1109/ACSAC.2006.43},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/XieRO06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangLXRKC06,
  author    = {XiaoFeng Wang and
               Zhuowei Li and
               Jun Xu and
               Michael K. Reiter and
               Chongkyung Kil and
               Jong Youl Choi},
  title     = {Packet vaccine: black-box exploit detection and signature generation},
  booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications
               Security, {CCS} 2006, Alexandria, VA, USA, Ioctober 30 - November
               3, 2006},
  pages     = {37--46},
  year      = {2006},
  crossref  = {DBLP:conf/ccs/2006usa},
  url       = {https://doi.org/10.1145/1180405.1180412},
  doi       = {10.1145/1180405.1180412},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/WangLXRKC06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SekarXRZ06,
  author    = {Vyas Sekar and
               Yinglian Xie and
               Michael K. Reiter and
               Hui Zhang},
  title     = {A Multi-Resolution Approach for Worm Detection and Containment},
  booktitle = {2006 International Conference on Dependable Systems and Networks {(DSN}
               2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings},
  pages     = {189--198},
  year      = {2006},
  crossref  = {DBLP:conf/dsn/2006},
  url       = {https://doi.org/10.1109/DSN.2006.6},
  doi       = {10.1109/DSN.2006.6},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/SekarXRZ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CollinsR06,
  author    = {Michael P. Collins and
               Michael K. Reiter},
  title     = {Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors},
  booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
               in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  pages     = {1--17},
  year      = {2006},
  crossref  = {DBLP:conf/esorics/2006},
  url       = {https://doi.org/10.1007/11863908\_1},
  doi       = {10.1007/11863908\_1},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/CollinsR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GargBBPR06,
  author    = {Deepak Garg and
               Lujo Bauer and
               Kevin D. Bowers and
               Frank Pfenning and
               Michael K. Reiter},
  title     = {A Linear Logic of Authorization and Knowledge},
  booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
               in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  pages     = {297--312},
  year      = {2006},
  crossref  = {DBLP:conf/esorics/2006},
  url       = {https://doi.org/10.1007/11863908\_19},
  doi       = {10.1007/11863908\_19},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/GargBBPR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/PerngRW06,
  author    = {Ginger Perng and
               Michael K. Reiter and
               Chenxi Wang},
  title     = {{M2:} Multicasting Mixes for Efficient and Anonymous Communication},
  booktitle = {26th {IEEE} International Conference on Distributed Computing Systems
               {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
  pages     = {59},
  year      = {2006},
  crossref  = {DBLP:conf/icdcs/2006},
  url       = {https://doi.org/10.1109/ICDCS.2006.53},
  doi       = {10.1109/ICDCS.2006.53},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/PerngRW06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/XieSRZ06,
  author    = {Yinglian Xie and
               Vyas Sekar and
               Michael K. Reiter and
               Hui Zhang},
  title     = {Forensic Analysis for Epidemic Attacks in Federated Networks},
  booktitle = {Proceedings of the 14th {IEEE} International Conference on Network
               Protocols, {ICNP} 2006, November 12-15, 2006, Santa Barbara, California,
               {USA}},
  pages     = {43--53},
  year      = {2006},
  crossref  = {DBLP:conf/icnp/2006},
  url       = {https://doi.org/10.1109/ICNP.2006.320197},
  doi       = {10.1109/ICNP.2006.320197},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icnp/XieSRZ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/GolovinGMOR06,
  author    = {Daniel Golovin and
               Anupam Gupta and
               Bruce M. Maggs and
               Florian Oprea and
               Michael K. Reiter},
  title     = {Quorum placement in networks: minimizing network congestion},
  booktitle = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2006, Denver, CO, USA, July 23-26,
               2006},
  pages     = {16--25},
  year      = {2006},
  crossref  = {DBLP:conf/podc/2006},
  url       = {https://doi.org/10.1145/1146381.1146388},
  doi       = {10.1145/1146381.1146388},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/podc/GolovinGMOR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GaoRS06,
  author    = {Debin Gao and
               Michael K. Reiter and
               Dawn Xiaodong Song},
  title     = {Behavioral Distance Measurement Using Hidden Markov Models},
  booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium,
               {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  pages     = {19--40},
  year      = {2006},
  crossref  = {DBLP:conf/raid/2006},
  url       = {https://doi.org/10.1007/11856214\_2},
  doi       = {10.1007/11856214\_2},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/raid/GaoRS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/WangR06,
  author    = {XiaoFeng Wang and
               Michael K. Reiter},
  title     = {{WRAPS:} Denial-of-Service Defense through Web Referrals},
  booktitle = {25th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2006),2-4
               October 2006, Leeds, {UK}},
  pages     = {51--60},
  year      = {2006},
  crossref  = {DBLP:conf/srds/2006},
  url       = {https://doi.org/10.1109/SRDS.2006.48},
  doi       = {10.1109/SRDS.2006.48},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/WangR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/McCunePR06,
  author    = {Jonathan M. McCune and
               Adrian Perrig and
               Michael K. Reiter},
  title     = {Bump in the Ether: {A} Framework for Securing Sensitive User Input},
  booktitle = {Proceedings of the 2006 {USENIX} Annual Technical Conference, Boston,
               MA, USA, May 30 - June 3, 2006},
  pages     = {185--198},
  year      = {2006},
  crossref  = {DBLP:conf/usenix/2006g},
  url       = {http://www.usenix.org/events/usenix06/tech/mccune.html},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/usenix/McCunePR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/OpreaR06,
  author    = {Alina Oprea and
               Michael K. Reiter},
  title     = {On Consistency of Encrypted Files},
  booktitle = {Distributed Computing, 20th International Symposium, {DISC} 2006,
               Stockholm, Sweden, September 18-20, 2006, Proceedings},
  pages     = {254--268},
  year      = {2006},
  crossref  = {DBLP:conf/wdag/2006},
  url       = {https://doi.org/10.1007/11864219\_18},
  doi       = {10.1007/11864219\_18},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wdag/OpreaR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/Abd-El-MalekGGRW06,
  author    = {Michael Abd{-}El{-}Malek and
               Gregory R. Ganger and
               Garth R. Goodson and
               Michael K. Reiter and
               Jay J. Wylie},
  title     = {Towards bounded wait-free {PASIS}},
  booktitle = {From Security to Dependability, 10.09. - 15.09.2006},
  year      = {2006},
  crossref  = {DBLP:conf/dagstuhl/2006P6371},
  url       = {http://drops.dagstuhl.de/opus/volltexte/2007/848},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/Abd-El-MalekGGRW06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ReiterWW05,
  author    = {Michael K. Reiter and
               XiaoFeng Wang and
               Matthew K. Wright},
  title     = {Building Reliable Mix Networks with Fair Exchange},
  booktitle = {Applied Cryptography and Network Security, Third International Conference,
               {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  pages     = {378--392},
  year      = {2005},
  crossref  = {DBLP:conf/acns/2005},
  url       = {https://doi.org/10.1007/11496137\_26},
  doi       = {10.1007/11496137\_26},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/ReiterWW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/PerngRW05,
  author    = {Ginger Perng and
               Michael K. Reiter and
               Chenxi Wang},
  title     = {Censorship Resistance Revisited},
  booktitle = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona,
               Spain, June 6-8, 2005, Revised Selected Papers},
  pages     = {62--76},
  year      = {2005},
  crossref  = {DBLP:conf/ih/2005},
  url       = {https://doi.org/10.1007/11558859\_6},
  doi       = {10.1007/11558859\_6},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ih/PerngRW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BauerGMRRR05,
  author    = {Lujo Bauer and
               Scott Garriss and
               Jonathan M. McCune and
               Michael K. Reiter and
               Jason Rouse and
               Peter Rutenbar},
  title     = {Device-Enabled Authorization in the Grey-System},
  booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
               September 20-23, 2005, Proceedings},
  pages     = {431--445},
  year      = {2005},
  crossref  = {DBLP:conf/isw/2005},
  url       = {https://doi.org/10.1007/11556992\_31},
  doi       = {10.1007/11556992\_31},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/BauerGMRRR05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/OpreaR05,
  author    = {Alina Oprea and
               Michael K. Reiter},
  title     = {Space-Efficient Block Storage Integrity},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2005, San Diego, California, {USA}},
  year      = {2005},
  crossref  = {DBLP:conf/ndss/2005},
  url       = {http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/storageint.pdf},
  timestamp = {Thu, 23 Feb 2006 15:03:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/OpreaR05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/GuptaMOR05,
  author    = {Anupam Gupta and
               Bruce M. Maggs and
               Florian Oprea and
               Michael K. Reiter},
  title     = {Quorum placement in networks to minimize access delays},
  booktitle = {Proceedings of the Twenty-Fourth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2005, Las Vegas, NV, USA, July 17-20,
               2005},
  pages     = {87--96},
  year      = {2005},
  crossref  = {DBLP:conf/podc/2005},
  url       = {https://doi.org/10.1145/1073814.1073829},
  doi       = {10.1145/1073814.1073829},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/podc/GuptaMOR05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GaoRS05,
  author    = {Debin Gao and
               Michael K. Reiter and
               Dawn Xiaodong Song},
  title     = {Behavioral Distance for Intrusion Detection},
  booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium,
               {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  pages     = {63--81},
  year      = {2005},
  crossref  = {DBLP:conf/raid/2005},
  url       = {https://doi.org/10.1007/11663812\_4},
  doi       = {10.1007/11663812\_4},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/raid/GaoRS05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/Abd-El-MalekGGRW05,
  author    = {Michael Abd{-}El{-}Malek and
               Gregory R. Ganger and
               Garth R. Goodson and
               Michael K. Reiter and
               Jay J. Wylie},
  title     = {Fault-scalable Byzantine fault-tolerant services},
  booktitle = {Proceedings of the 20th {ACM} Symposium on Operating Systems Principles
               2005, {SOSP} 2005, Brighton, UK, October 23-26, 2005},
  pages     = {59--74},
  year      = {2005},
  crossref  = {DBLP:conf/sosp/2005},
  url       = {https://doi.org/10.1145/1095810.1095817},
  doi       = {10.1145/1095810.1095817},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/Abd-El-MalekGGRW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/McCuneSPR05,
  author    = {Jonathan M. McCune and
               Elaine Shi and
               Adrian Perrig and
               Michael K. Reiter},
  title     = {Detection of Denial-of-Message Attacks on Sensor Network Broadcasts},
  booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
               May 2005, Oakland, CA, {USA}},
  pages     = {64--78},
  year      = {2005},
  crossref  = {DBLP:conf/sp/2005},
  url       = {https://doi.org/10.1109/SP.2005.7},
  doi       = {10.1109/SP.2005.7},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/McCuneSPR05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BauerGR05,
  author    = {Lujo Bauer and
               Scott Garriss and
               Michael K. Reiter},
  title     = {Distributed Proving in Access-Control Systems},
  booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
               May 2005, Oakland, CA, {USA}},
  pages     = {81--95},
  year      = {2005},
  crossref  = {DBLP:conf/sp/2005},
  url       = {https://doi.org/10.1109/SP.2005.9},
  doi       = {10.1109/SP.2005.9},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/BauerGR05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/McCunePR05,
  author    = {Jonathan M. McCune and
               Adrian Perrig and
               Michael K. Reiter},
  title     = {Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication},
  booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
               May 2005, Oakland, CA, {USA}},
  pages     = {110--124},
  year      = {2005},
  crossref  = {DBLP:conf/sp/2005},
  url       = {https://doi.org/10.1109/SP.2005.19},
  doi       = {10.1109/SP.2005.19},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/McCunePR05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/XieSMRZ05,
  author    = {Yinglian Xie and
               Vyas Sekar and
               David A. Maltz and
               Michael K. Reiter and
               Hui Zhang},
  title     = {Worm Origin Identification Using Random Moonwalks},
  booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
               May 2005, Oakland, CA, {USA}},
  pages     = {242--256},
  year      = {2005},
  crossref  = {DBLP:conf/sp/2005},
  url       = {https://doi.org/10.1109/SP.2005.23},
  doi       = {10.1109/SP.2005.23},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/XieSMRZ05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/ReiterSW05,
  author    = {Michael K. Reiter and
               Asad Samar and
               Chenxi Wang},
  title     = {Distributed Construction of a Fault-Tolerant Network from a Tree},
  booktitle = {24th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2005),26-28
               October 2005, Orlando, FL, {USA}},
  pages     = {155--165},
  year      = {2005},
  crossref  = {DBLP:conf/srds/2005},
  url       = {https://doi.org/10.1109/RELDIS.2005.16},
  doi       = {10.1109/RELDIS.2005.16},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/ReiterSW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/Abd-El-MalekGRWG05,
  author    = {Michael Abd{-}El{-}Malek and
               Gregory R. Ganger and
               Michael K. Reiter and
               Jay J. Wylie and
               Garth R. Goodson},
  title     = {Lazy Verification in Fault-Tolerant Distributed Storage Systems},
  booktitle = {24th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2005),26-28
               October 2005, Orlando, FL, {USA}},
  pages     = {179--190},
  year      = {2005},
  crossref  = {DBLP:conf/srds/2005},
  url       = {https://doi.org/10.1109/RELDIS.2005.20},
  doi       = {10.1109/RELDIS.2005.20},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/Abd-El-MalekGRWG05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigecom/2005,
  editor    = {John Riedl and
               Michael J. Kearns and
               Michael K. Reiter},
  title     = {Proceedings 6th {ACM} Conference on Electronic Commerce (EC-2005),
               Vancouver, BC, Canada, June 5-8, 2005},
  publisher = {{ACM}},
  year      = {2005},
  url       = {https://doi.org/10.1145/1064009},
  doi       = {10.1145/1064009},
  isbn      = {1-59593-049-3},
  timestamp = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigecom/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MacKenzieR04,
  author    = {Philip D. MacKenzie and
               Michael K. Reiter},
  title     = {Two-party generation of {DSA} signatures},
  journal   = {Int. J. Inf. Sec.},
  volume    = {2},
  number    = {3-4},
  pages     = {218--239},
  year      = {2004},
  url       = {https://doi.org/10.1007/s10207-004-0041-0},
  doi       = {10.1007/s10207-004-0041-0},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/MacKenzieR04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/ReiterR04,
  author    = {Michael K. Reiter and
               Pankaj Rohatgi},
  title     = {Homeland Security},
  journal   = {{IEEE} Internet Computing},
  volume    = {8},
  number    = {6},
  pages     = {16--17},
  year      = {2004},
  url       = {https://doi.org/10.1109/MIC.2004.62},
  doi       = {10.1109/MIC.2004.62},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/internet/ReiterR04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KissnerORSY04,
  author    = {Lea Kissner and
               Alina Oprea and
               Michael K. Reiter and
               Dawn Xiaodong Song and
               Ke Yang},
  title     = {Private Keyword-Based Push and Pull with Applications to Anonymous
               Communication},
  booktitle = {Applied Cryptography and Network Security, Second International Conference,
               {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  pages     = {16--30},
  year      = {2004},
  crossref  = {DBLP:conf/acns/2004},
  url       = {https://doi.org/10.1007/978-3-540-24852-1\_2},
  doi       = {10.1007/978-3-540-24852-1\_2},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/KissnerORSY04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ReiterW04,
  author    = {Michael K. Reiter and
               XiaoFeng Wang},
  title     = {Fragile mixing},
  booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications
               Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages     = {227--235},
  year      = {2004},
  crossref  = {DBLP:conf/ccs/2004ccs},
  url       = {https://doi.org/10.1145/1030083.1030114},
  doi       = {10.1145/1030083.1030114},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ReiterW04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangR04,
  author    = {XiaoFeng Wang and
               Michael K. Reiter},
  title     = {Mitigating bandwidth-exhaustion attacks using congestion puzzles},
  booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications
               Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages     = {257--267},
  year      = {2004},
  crossref  = {DBLP:conf/ccs/2004ccs},
  url       = {https://doi.org/10.1145/1030083.1030118},
  doi       = {10.1145/1030083.1030118},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/WangR04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaoRS04,
  author    = {Debin Gao and
               Michael K. Reiter and
               Dawn Xiaodong Song},
  title     = {Gray-box extraction of execution graphs for anomaly detection},
  booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications
               Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages     = {318--329},
  year      = {2004},
  crossref  = {DBLP:conf/ccs/2004ccs},
  url       = {https://doi.org/10.1145/1030083.1030126},
  doi       = {10.1145/1030083.1030126},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/GaoRS04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/GoodsonWGR04,
  author    = {Garth R. Goodson and
               Jay J. Wylie and
               Gregory R. Ganger and
               Michael K. Reiter},
  title     = {Efficient Byzantine-Tolerant Erasure-Coded Storage},
  booktitle = {2004 International Conference on Dependable Systems and Networks {(DSN}
               2004), 28 June - 1 July 2004, Florence, Italy, Proceedings},
  pages     = {135--144},
  year      = {2004},
  crossref  = {DBLP:conf/dsn/2004},
  url       = {https://doi.org/10.1109/DSN.2004.1311884},
  doi       = {10.1109/DSN.2004.1311884},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/GoodsonWGR04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LevineRWW04,
  author    = {Brian Neil Levine and
               Michael K. Reiter and
               Chenxi Wang and
               Matthew K. Wright},
  title     = {Timing Attacks in Low-Latency Mix Systems (Extended Abstract)},
  booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
               West, FL, USA, February 9-12, 2004. Revised Papers},
  pages     = {251--265},
  year      = {2004},
  crossref  = {DBLP:conf/fc/2004},
  url       = {https://doi.org/10.1007/978-3-540-27809-2\_25},
  doi       = {10.1007/978-3-540-27809-2\_25},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/LevineRWW04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DavisMR04,
  author    = {Darren Davis and
               Fabian Monrose and
               Michael K. Reiter},
  title     = {Time-Scoped Searching of Encrypted Audit Logs},
  booktitle = {Information and Communications Security, 6th International Conference,
               {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  pages     = {532--545},
  year      = {2004},
  crossref  = {DBLP:conf/icics/2004},
  url       = {https://doi.org/10.1007/978-3-540-30191-2\_41},
  doi       = {10.1007/978-3-540-30191-2\_41},
  timestamp = {Mon, 07 May 2018 15:01:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/DavisMR04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Reiter04,
  author    = {Michael K. Reiter},
  title     = {Security by, and for, Converged Mobile Devices},
  booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International
               Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  pages     = {1},
  year      = {2004},
  crossref  = {DBLP:conf/icisc/2004},
  url       = {https://doi.org/10.1007/11496618\_1},
  doi       = {10.1007/11496618\_1},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/Reiter04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XieKORZ04,
  author    = {Yinglian Xie and
               Hyang{-}Ah Kim and
               David R. O'Hallaron and
               Michael K. Reiter and
               Hui Zhang},
  title     = {Seurat: {A} Pointillist Approach to Anomaly Detection},
  booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium,
               {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  pages     = {238--257},
  year      = {2004},
  crossref  = {DBLP:conf/raid/2004},
  url       = {https://doi.org/10.1007/978-3-540-30143-1\_13},
  doi       = {10.1007/978-3-540-30143-1\_13},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/XieKORZ04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CollinsR04,
  author    = {Michael P. Collins and
               Michael K. Reiter},
  title     = {An Empirical Analysis of Target-Resident DoS Filters},
  booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
               May 2004, Berkeley, CA, {USA}},
  pages     = {103--114},
  year      = {2004},
  crossref  = {DBLP:conf/sp/2004},
  url       = {https://doi.org/10.1109/SECPRI.2004.1301318},
  doi       = {10.1109/SECPRI.2004.1301318},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/CollinsR04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/FryR04,
  author    = {Charles P. Fry and
               Michael K. Reiter},
  title     = {Nested Objects in a Byzantine Quorum-Replicated System},
  booktitle = {23rd International Symposium on Reliable Distributed Systems {(SRDS}
               2004), 18-20 October 2004, Florianpolis, Brazil},
  pages     = {79--89},
  year      = {2004},
  crossref  = {DBLP:conf/srds/2004},
  url       = {https://doi.org/10.1109/RELDIS.2004.1353005},
  doi       = {10.1109/RELDIS.2004.1353005},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/FryR04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MacKenzieRY04,
  author    = {Philip D. MacKenzie and
               Michael K. Reiter and
               Ke Yang},
  title     = {Alternatives to Non-malleability: Definitions, Constructions, and
               Applications (Extended Abstract)},
  booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
               2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  pages     = {171--190},
  year      = {2004},
  crossref  = {DBLP:conf/tcc/2004},
  url       = {https://doi.org/10.1007/978-3-540-24638-1\_10},
  doi       = {10.1007/978-3-540-24638-1\_10},
  timestamp = {Mon, 29 May 2017 16:53:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/MacKenzieRY04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GaoRS04,
  author    = {Debin Gao and
               Michael K. Reiter and
               Dawn Xiaodong Song},
  title     = {On Gray-Box Program Tracking for Anomaly Detection},
  booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
               2004, San Diego, CA, {USA}},
  pages     = {103--118},
  year      = {2004},
  crossref  = {DBLP:conf/uss/2004},
  url       = {http://www.usenix.org/publications/library/proceedings/sec04/tech/gao.html},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/GaoRS04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DavisMR04,
  author    = {Darren Davis and
               Fabian Monrose and
               Michael K. Reiter},
  title     = {On User Choice in Graphical Password Schemes},
  booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
               2004, San Diego, CA, {USA}},
  pages     = {151--164},
  year      = {2004},
  crossref  = {DBLP:conf/uss/2004},
  url       = {http://www.usenix.org/publications/library/proceedings/sec04/tech/davis.html},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/DavisMR04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/MalkhiMRT03,
  author    = {Dahlia Malkhi and
               Michael Merritt and
               Michael K. Reiter and
               Gadi Taubenfeld},
  title     = {Objects shared by Byzantine processes},
  journal   = {Distributed Computing},
  volume    = {16},
  number    = {1},
  pages     = {37--48},
  year      = {2003},
  url       = {https://doi.org/10.1007/s00446-002-0075-3},
  doi       = {10.1007/s00446-002-0075-3},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dc/MalkhiMRT03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/MacKenzieR03,
  author    = {Philip D. MacKenzie and
               Michael K. Reiter},
  title     = {Delegation of cryptographic servers for capture-resilient devices},
  journal   = {Distributed Computing},
  volume    = {16},
  number    = {4},
  pages     = {307--327},
  year      = {2003},
  url       = {https://doi.org/10.1007/s00446-003-0098-4},
  doi       = {10.1007/s00446-003-0098-4},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dc/MacKenzieR03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MacKenzieR03,
  author    = {Philip D. MacKenzie and
               Michael K. Reiter},
  title     = {Networked cryptographic devices resilient to capture},
  journal   = {Int. J. Inf. Sec.},
  volume    = {2},
  number    = {1},
  pages     = {1--20},
  year      = {2003},
  url       = {https://doi.org/10.1007/s10207-003-0022-8},
  doi       = {10.1007/s10207-003-0022-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/MacKenzieR03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/MalkhiMR03,
  author    = {Dahlia Malkhi and
               Yishay Mansour and
               Michael K. Reiter},
  title     = {Diffusion without false rumors: on propagating updates in a Byzantine
               environment},
  journal   = {Theor. Comput. Sci.},
  volume    = {299},
  number    = {1-3},
  pages     = {289--306},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0304-3975(02)00325-0},
  doi       = {10.1016/S0304-3975(02)00325-0},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/MalkhiMR03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MacKenzieOR03,
  author    = {Philip D. MacKenzie and
               Alina Oprea and
               Michael K. Reiter},
  title     = {Automatic generation of two-party computations},
  booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications
               Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages     = {210--219},
  year      = {2003},
  crossref  = {DBLP:conf/ccs/2003},
  url       = {https://doi.org/10.1145/948109.948139},
  doi       = {10.1145/948109.948139},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/MacKenzieOR03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangR03,
  author    = {XiaoFeng Wang and
               Michael K. Reiter},
  title     = {Defending Against Denial-of-Service Attacks with Puzzle Auction},
  booktitle = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
               May 2003, Berkeley, CA, {USA}},
  pages     = {78--92},
  year      = {2003},
  crossref  = {DBLP:conf/sp/2003},
  url       = {https://doi.org/10.1109/SECPRI.2003.1199329},
  doi       = {10.1109/SECPRI.2003.1199329},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/WangR03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/ReiterSW03,
  author    = {Michael K. Reiter and
               Asad Samar and
               Chenxi Wang},
  title     = {The Design and Implementation of a JCA-Compliant Capture Protection
               Infrastructure},
  booktitle = {22nd Symposium on Reliable Distributed Systems {(SRDS} 2003), 6-8
               October 2003, Florence, Italy},
  pages     = {339--348},
  year      = {2003},
  crossref  = {DBLP:conf/srds/2003},
  url       = {https://doi.org/10.1109/RELDIS.2003.1238086},
  doi       = {10.1109/RELDIS.2003.1238086},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/ReiterSW03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/FelberR02,
  author    = {Pascal Felber and
               Michael K. Reiter},
  title     = {Advanced concurrency control in Java},
  journal   = {Concurrency and Computation: Practice and Experience},
  volume    = {14},
  number    = {4},
  pages     = {261--285},
  year      = {2002},
  url       = {https://doi.org/10.1002/cpe.635},
  doi       = {10.1002/cpe.635},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/concurrency/FelberR02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MonroseRW02,
  author    = {Fabian Monrose and
               Michael K. Reiter and
               Susanne Wetzel},
  title     = {Password hardening based on keystroke dynamics},
  journal   = {Int. J. Inf. Sec.},
  volume    = {1},
  number    = {2},
  pages     = {69--83},
  year      = {2002},
  url       = {https://doi.org/10.1007/s102070100006},
  doi       = {10.1007/s102070100006},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/MonroseRW02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpdc/XieOR02,
  author    = {Yinglian Xie and
               David R. O'Hallaron and
               Michael K. Reiter},
  title     = {A Secure Distributed Search System},
  booktitle = {11th {IEEE} International Symposium on High Performance Distributed
               Computing {(HPDC-11} 2002), 23-26 July 2002, Edinburgh, Scotland,
               {UK}},
  pages     = {321},
  year      = {2002},
  crossref  = {DBLP:conf/hpdc/2002},
  url       = {https://doi.org/10.1109/HPDC.2002.1029932},
  doi       = {10.1109/HPDC.2002.1029932},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hpdc/XieOR02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MonroseRLLS02,
  author    = {Fabian Monrose and
               Michael K. Reiter and
               Qi Li and
               Daniel P. Lopresti and
               Chilin Shih},
  title     = {Toward Speech-Generated Cryptographic Keys on Resource-Constrained
               Devices},
  booktitle = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
               CA, USA, August 5-9, 2002},
  pages     = {283--296},
  year      = {2002},
  crossref  = {DBLP:conf/uss/2002},
  url       = {http://www.usenix.org/publications/library/proceedings/sec02/monrose.html},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/MonroseRLLS02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/MalkhiRWW01,
  author    = {Dahlia Malkhi and
               Michael K. Reiter and
               Avishai Wool and
               Rebecca N. Wright},
  title     = {Probabilistic Quorum Systems},
  journal   = {Inf. Comput.},
  volume    = {170},
  number    = {2},
  pages     = {184--206},
  year      = {2001},
  url       = {https://doi.org/10.1006/inco.2001.3054},
  doi       = {10.1006/inco.2001.3054},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iandc/MalkhiRWW01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SamaratiRJ01,
  author    = {Pierangela Samarati and
               Michael K. Reiter and
               Sushil Jajodia},
  title     = {An authorization model for a public key management service},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {4},
  number    = {4},
  pages     = {453--482},
  year      = {2001},
  url       = {https://doi.org/10.1145/503339.503343},
  doi       = {10.1145/503339.503343},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/SamaratiRJ01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/PriscoMR01,
  author    = {Roberto De Prisco and
               Dahlia Malkhi and
               Michael K. Reiter},
  title     = {On k-Set Consensus Problems in Asynchronous Systems},
  journal   = {{IEEE} Trans. Parallel Distrib. Syst.},
  volume    = {12},
  number    = {1},
  pages     = {7--21},
  year      = {2001},
  url       = {https://doi.org/10.1109/71.899936},
  doi       = {10.1109/71.899936},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tpds/PriscoMR01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/AlvisiMPR01,
  author    = {Lorenzo Alvisi and
               Dahlia Malkhi and
               Evelyn Tumlin Pierce and
               Michael K. Reiter},
  title     = {Fault Detection for Byzantine Quorum Systems},
  journal   = {{IEEE} Trans. Parallel Distrib. Syst.},
  volume    = {12},
  number    = {9},
  pages     = {996--1007},
  year      = {2001},
  url       = {https://doi.org/10.1109/71.954640},
  doi       = {10.1109/71.954640},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tpds/AlvisiMPR01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JakobssonR01,
  author    = {Markus Jakobsson and
               Michael K. Reiter},
  title     = {Discouraging Software Piracy Using Software Aging},
  booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
               {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  pages     = {1--12},
  year      = {2001},
  crossref  = {DBLP:conf/ccs/2001drm},
  url       = {https://doi.org/10.1007/3-540-47870-1\_1},
  doi       = {10.1007/3-540-47870-1\_1},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/JakobssonR01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MacKenzieR01,
  author    = {Philip D. MacKenzie and
               Michael K. Reiter},
  title     = {Delegation of cryptographic servers for capture-resilient devices},
  booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
               Communications Security, Philadelphia, Pennsylvania, USA, November
               6-8, 2001.},
  pages     = {10--19},
  year      = {2001},
  crossref  = {DBLP:conf/ccs/2001},
  url       = {https://doi.org/10.1145/501983.501986},
  doi       = {10.1145/501983.501986},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/MacKenzieR01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MacKenzieR01,
  author    = {Philip D. MacKenzie and
               Michael K. Reiter},
  title     = {Two-Party Generation of {DSA} Signatures},
  booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  pages     = {137--154},
  year      = {2001},
  crossref  = {DBLP:conf/crypto/2001},
  url       = {https://doi.org/10.1007/3-540-44647-8\_8},
  doi       = {10.1007/3-540-44647-8\_8},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/MacKenzieR01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ChocklerMR01,
  author    = {Gregory V. Chockler and
               Dahlia Malkhi and
               Michael K. Reiter},
  title     = {Backoff Protocols for Distributed Mutual Exclusion and Ordering},
  booktitle = {Proceedings of the 21st International Conference on Distributed Computing
               Systems {(ICDCS} 2001), Phoenix, Arizona, USA, April 16-19, 2001},
  pages     = {11--20},
  year      = {2001},
  crossref  = {DBLP:conf/icdcs/2001},
  url       = {https://doi.org/10.1109/ICDSC.2001.918928},
  doi       = {10.1109/ICDSC.2001.918928},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/ChocklerMR01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/odyssey/MonroseRLW01,
  author    = {Fabian Monrose and
               Michael K. Reiter and
               Qi Li and
               Susanne Wetzel},
  title     = {Using voice to generate cryptographic keys},
  booktitle = {2001: {A} Speaker Odyssey - The Speaker Recognition Workshop, Crete,
               Greece, June 18-22, 2001},
  pages     = {237--242},
  year      = {2001},
  crossref  = {DBLP:conf/odyssey/2001},
  url       = {http://www.isca-speech.org/archive\_open/odyssey/odys\_237.html},
  timestamp = {Tue, 11 Mar 2014 17:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/odyssey/MonroseRLW01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/CanettiIKRRW01,
  author    = {Ran Canetti and
               Yuval Ishai and
               Ravi Kumar and
               Michael K. Reiter and
               Ronitt Rubinfeld and
               Rebecca N. Wright},
  title     = {Selective private function evaluation with applications to private
               statistics},
  booktitle = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA,
               August 26-29, 2001},
  pages     = {293--304},
  year      = {2001},
  crossref  = {DBLP:conf/podc/2001},
  url       = {https://doi.org/10.1145/383962.384047},
  doi       = {10.1145/383962.384047},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/podc/CanettiIKRRW01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MacKenzieR01,
  author    = {Philip D. MacKenzie and
               Michael K. Reiter},
  title     = {Networked Cryptographic Devices Resilient to Capture},
  booktitle = {2001 {IEEE} Symposium on Security and Privacy, Oakland, California,
               {USA} May 14-16, 2001},
  pages     = {12--25},
  year      = {2001},
  crossref  = {DBLP:conf/sp/2001},
  url       = {https://doi.org/10.1109/SECPRI.2001.924284},
  doi       = {10.1109/SECPRI.2001.924284},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/MacKenzieR01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MonroseRLW01,
  author    = {Fabian Monrose and
               Michael K. Reiter and
               Qi Li and
               Susanne Wetzel},
  title     = {Cryptographic Key Generation from Voice},
  booktitle = {2001 {IEEE} Symposium on Security and Privacy, Oakland, California,
               {USA} May 14-16, 2001},
  pages     = {202--213},
  year      = {2001},
  crossref  = {DBLP:conf/sp/2001},
  url       = {https://doi.org/10.1109/SECPRI.2001.924299},
  doi       = {10.1109/SECPRI.2001.924299},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/MonroseRLW01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/MalkhiRRS01,
  author    = {Dahlia Malkhi and
               Ohad Rodeh and
               Michael K. Reiter and
               Yaron Sella},
  title     = {Efficient Update Diffusion in Byzantine Environments},
  booktitle = {20th Symposium on Reliable Distributed Systems {(SRDS} 2001), 28-31
               October 2001, New Orleans, LA, {USA}},
  pages     = {90--98},
  year      = {2001},
  crossref  = {DBLP:conf/srds/2001},
  url       = {https://doi.org/10.1109/RELDIS.2001.969758},
  doi       = {10.1109/RELDIS.2001.969758},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/MalkhiRRS01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2001,
  editor    = {Michael K. Reiter and
               Pierangela Samarati},
  title     = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
               Communications Security, Philadelphia, Pennsylvania, USA, November
               6-8, 2001},
  publisher = {{ACM}},
  year      = {2001},
  url       = {http://dl.acm.org/citation.cfm?id=501983},
  isbn      = {1-58113-385-5},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/MalkhiRW00,
  author    = {Dahlia Malkhi and
               Michael K. Reiter and
               Avishai Wool},
  title     = {The Load and Availability of Byzantine Quorum Systems},
  journal   = {{SIAM} J. Comput.},
  volume    = {29},
  number    = {6},
  pages     = {1889--1906},
  year      = {2000},
  url       = {https://doi.org/10.1137/S0097539797325235},
  doi       = {10.1137/S0097539797325235},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/siamcomp/MalkhiRW00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/MalkhiR00,
  author    = {Dahlia Malkhi and
               Michael K. Reiter},
  title     = {An Architecture for Survivable Coordination in Large Distributed Systems},
  journal   = {{IEEE} Trans. Knowl. Data Eng.},
  volume    = {12},
  number    = {2},
  pages     = {187--202},
  year      = {2000},
  url       = {https://doi.org/10.1109/69.842262},
  doi       = {10.1109/69.842262},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tkde/MalkhiR00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/MalkhiR00,
  author    = {Dahlia Malkhi and
               Michael K. Reiter},
  title     = {Secure Execution of Java Applets Using a Remote Playground},
  journal   = {{IEEE} Trans. Software Eng.},
  volume    = {26},
  number    = {12},
  pages     = {1197--1209},
  year      = {2000},
  url       = {https://doi.org/10.1109/32.888632},
  doi       = {10.1109/32.888632},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tse/MalkhiR00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AdamsBDRZ00,
  author    = {Carlisle M. Adams and
               Mike Burmester and
               Yvo Desmedt and
               Michael K. Reiter and
               Philip Zimmermann},
  title     = {Which {PKI} (public key infrastructure) is the right one? (panel session)},
  booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
               Communications Security, Athens, Greece, November 1-4, 2000.},
  pages     = {98--101},
  year      = {2000},
  crossref  = {DBLP:conf/ccs/2000},
  url       = {https://doi.org/10.1145/352600.352615},
  doi       = {10.1145/352600.352615},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AdamsBDRZ00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/AlvisiPMRW00,
  author    = {Lorenzo Alvisi and
               Evelyn Tumlin Pierce and
               Dahlia Malkhi and
               Michael K. Reiter and
               Rebecca N. Wright},
  title     = {Dynamic Byzantine Quorum Systems},
  booktitle = {2000 International Conference on Dependable Systems and Networks {(DSN}
               2000) (formerly {FTCS-30} and DCCA-8), 25-28 June 2000, New York,
               NY, {USA}},
  pages     = {283--292},
  year      = {2000},
  crossref  = {DBLP:conf/dsn/2000},
  url       = {https://doi.org/10.1109/ICDSN.2000.857551},
  doi       = {10.1109/ICDSN.2000.857551},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/AlvisiPMRW00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/ArleinJJMR00,
  author    = {Robert M. Arlein and
               Ben Jai and
               Markus Jakobsson and
               Fabian Monrose and
               Michael K. Reiter},
  title     = {Privacy-preserving global customization},
  booktitle = {Proceedings of the 2nd {ACM} Conference on Electronic Commerce (EC-00),
               Minneapolis, MN, USA, October 17-20, 2000},
  pages     = {176--184},
  year      = {2000},
  crossref  = {DBLP:conf/sigecom/2000},
  url       = {https://doi.org/10.1145/352871.352891},
  doi       = {10.1145/352871.352891},
  timestamp = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigecom/ArleinJJMR00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/MalkhiMRT00,
  author    = {Dahlia Malkhi and
               Michael Merritt and
               Michael K. Reiter and
               Gadi Taubenfeld},
  title     = {Objects Shared by Byzantine Processes},
  booktitle = {Distributed Computing, 14th International Conference, {DISC} 2000,
               Toledo, Spain, October 4-6, 2000, Proceedings},
  pages     = {345--359},
  year      = {2000},
  crossref  = {DBLP:conf/wdag/2000},
  url       = {https://doi.org/10.1007/3-540-40026-5\_23},
  doi       = {10.1007/3-540-40026-5\_23},
  timestamp = {Wed, 14 Nov 2018 10:59:35 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wdag/MalkhiMRT00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/ReiterR99,
  author    = {Michael K. Reiter and
               Aviel D. Rubin},
  title     = {Anonymous Web Transactions with Crowds},
  journal   = {Commun. {ACM}},
  volume    = {42},
  number    = {2},
  pages     = {32--38},
  year      = {1999},
  url       = {https://doi.org/10.1145/293411.293778},
  doi       = {10.1145/293411.293778},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cacm/ReiterR99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AnupamMNPR99,
  author    = {Vinod Anupam and
               Alain J. Mayer and
               Kobbi Nissim and
               Benny Pinkas and
               Michael K. Reiter},
  title     = {On the Security of Pay-per-Click and Other Web Advertising Schemes},
  journal   = {Computer Networks},
  volume    = {31},
  number    = {11-16},
  pages     = {1091--1100},
  year      = {1999},
  url       = {https://doi.org/10.1016/S1389-1286(99)00023-7},
  doi       = {10.1016/S1389-1286(99)00023-7},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cn/AnupamMNPR99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Reiter99,
  author    = {Michael K. Reiter},
  title     = {High-Confidence Distributed Systems - Guest Editor's Introduction},
  journal   = {{IEEE} Internet Computing},
  volume    = {3},
  number    = {6},
  pages     = {52--54},
  year      = {1999},
  url       = {http://doi.ieeecomputersociety.org/10.1109/MIC.1999.10038},
  doi       = {10.1109/MIC.1999.10038},
  timestamp = {Wed, 16 Mar 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/internet/Reiter99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ReiterS99,
  author    = {Michael K. Reiter and
               Stuart G. Stubblebine},
  title     = {Authentication Metric Analysis and Design},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {2},
  number    = {2},
  pages     = {138--158},
  year      = {1999},
  url       = {https://doi.org/10.1145/317087.317088},
  doi       = {10.1145/317087.317088},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/ReiterS99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MonroseRW99,
  author    = {Fabian Monrose and
               Michael K. Reiter and
               Susanne Wetzel},
  title     = {Password Hardening Based on Keystroke Dynamics},
  booktitle = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
               Communications Security, Singapore, November 1-4, 1999.},
  pages     = {73--82},
  year      = {1999},
  crossref  = {DBLP:conf/ccs/1999},
  url       = {https://doi.org/10.1145/319709.319720},
  doi       = {10.1145/319709.319720},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/MonroseRW99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/PriscoMR99,
  author    = {Roberto De Prisco and
               Dahlia Malkhi and
               Michael K. Reiter},
  title     = {On \emph{k}-Set Consensus Problems in Asynchronous Systems},
  booktitle = {Proceedings of the Eighteenth Annual {ACM} Symposium on Principles
               of Distributed Computing, PODC, '99Atlanta, Georgia, USA, May 3-6,
               1999},
  pages     = {257--265},
  year      = {1999},
  crossref  = {DBLP:conf/podc/1999},
  url       = {https://doi.org/10.1145/301308.301368},
  doi       = {10.1145/301308.301368},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/podc/PriscoMR99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/MalkhiMR99,
  author    = {Dahlia Malkhi and
               Yishay Mansour and
               Michael K. Reiter},
  title     = {On Diffusing Updates in a Byzantine Environment},
  booktitle = {The Eighteenth Symposium on Reliable Distributed Systems, {SRDS} 1999,
               Lausanne, Switzerland, October 19-22, 1999, Proceedings},
  pages     = {134--143},
  year      = {1999},
  crossref  = {DBLP:conf/srds/1999},
  url       = {https://doi.org/10.1109/RELDIS.1999.805090},
  doi       = {10.1109/RELDIS.1999.805090},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/MalkhiMR99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JermynMMRR99,
  author    = {Ian Jermyn and
               Alain J. Mayer and
               Fabian Monrose and
               Michael K. Reiter and
               Aviel D. Rubin},
  title     = {The Design and Analysis of Graphical Passwords},
  booktitle = {Proceedings of the 8th {USENIX} Security Symposium, Washington, DC,
               USA, August 23-26, 1999},
  year      = {1999},
  crossref  = {DBLP:conf/uss/1999},
  url       = {https://www.usenix.org/conference/8th-usenix-security-symposium/design-and-analysis-graphical-passwords},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/JermynMMRR99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-9908009,
  author    = {Dahlia Malkhi and
               Michael K. Reiter},
  title     = {Secure Execution of Java Applets using a Remote Playground},
  journal   = {CoRR},
  volume    = {cs.CR/9908009},
  year      = {1999},
  url       = {http://arxiv.org/abs/cs.CR/9908009},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/cs-CR-9908009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-DC-9908010,
  author    = {Dahlia Malkhi and
               Yishay Mansour and
               Michael K. Reiter},
  title     = {On Propagating Updates in a Byzantine Environment},
  journal   = {CoRR},
  volume    = {cs.DC/9908010},
  year      = {1999},
  url       = {http://arxiv.org/abs/cs.DC/9908010},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/cs-DC-9908010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-DC-9908011,
  author    = {Dahlia Malkhi and
               Michael K. Reiter and
               Avishai Wool},
  title     = {The Load and Availability of Byzantine Quorum Systems},
  journal   = {CoRR},
  volume    = {cs.DC/9908011},
  year      = {1999},
  url       = {http://arxiv.org/abs/cs.DC/9908011},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/cs-DC-9908011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/MalkhiR98,
  author    = {Dahlia Malkhi and
               Michael K. Reiter},
  title     = {Byzantine Quorum Systems},
  journal   = {Distributed Computing},
  volume    = {11},
  number    = {4},
  pages     = {203--213},
  year      = {1998},
  url       = {https://doi.org/10.1007/s004460050050},
  doi       = {10.1007/s004460050050},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/dc/MalkhiR98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ReiterS98,
  author    = {Michael K. Reiter and
               Stuart G. Stubblebine},
  title     = {Resilient Authentication Using Path Independence},
  journal   = {{IEEE} Trans. Computers},
  volume    = {47},
  number    = {12},
  pages     = {1351--1362},
  year      = {1998},
  url       = {https://doi.org/10.1109/12.737682},
  doi       = {10.1109/12.737682},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tc/ReiterS98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ReiterR98,
  author    = {Michael K. Reiter and
               Aviel D. Rubin},
  title     = {Crowds: Anonymity for Web Transactions},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {66--92},
  year      = {1998},
  url       = {https://doi.org/10.1145/290163.290168},
  doi       = {10.1145/290163.290168},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/ReiterR98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/MalkhiRWW98,
  author    = {Dahlia Malkhi and
               Michael K. Reiter and
               Avishai Wool and
               Rebecca N. Wright},
  title     = {Probabilistic Byzantine Quorum Systems},
  booktitle = {Proceedings of the Seventeenth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} '98, Puerto Vallarta, Mexico, June
               28 - July 2, 1998},
  pages     = {321},
  year      = {1998},
  crossref  = {DBLP:conf/podc/1998},
  url       = {https://doi.org/10.1145/277697.277781},
  doi       = {10.1145/277697.277781},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/podc/MalkhiRWW98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MalkhiRR98,
  author    = {Dahlia Malkhi and
               Michael K. Reiter and
               Aviel D. Rubin},
  title     = {Secure Execution of Java Applets using a Remote Playground},
  booktitle = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy,
               Oakland, CA, USA, May 3-6, 1998, Proceedings},
  pages     = {40--51},
  year      = {1998},
  crossref  = {DBLP:conf/sp/1998},
  url       = {https://doi.org/10.1109/SECPRI.1998.674822},
  doi       = {10.1109/SECPRI.1998.674822},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/MalkhiRR98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/MalkhiR98,
  author    = {Dahlia Malkhi and
               Michael K. Reiter},
  title     = {Secure and Scalable Replication in Phalanx},
  booktitle = {The Seventeenth Symposium on Reliable Distributed Systems, {SRDS}
               1998, West Lafayette, Indiana, USA, October 20-22, 1998, Proceedings},
  pages     = {51--58},
  year      = {1998},
  crossref  = {DBLP:conf/srds/1998},
  url       = {https://doi.org/10.1109/RELDIS.1998.740474},
  doi       = {10.1109/RELDIS.1998.740474},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/MalkhiR98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/MalkhiR98a,
  author    = {Dahlia Malkhi and
               Michael K. Reiter},
  title     = {Survivable Consensus Objects},
  booktitle = {The Seventeenth Symposium on Reliable Distributed Systems, {SRDS}
               1998, West Lafayette, Indiana, USA, October 20-22, 1998, Proceedings},
  pages     = {271--279},
  year      = {1998},
  crossref  = {DBLP:conf/srds/1998},
  url       = {https://doi.org/10.1109/RELDIS.1998.740509},
  doi       = {10.1109/RELDIS.1998.740509},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/MalkhiR98a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uwec/ReiterAM98,
  author    = {Michael K. Reiter and
               Vinod Anupam and
               Alain J. Mayer},
  title     = {Detecting Hit Shaving in Click-Through Payment Schemes},
  booktitle = {Proceedings of the 3rd {USENIX} Workshop on Electronic Commerce, Boston,
               Massachusetts, USA, August 31 - September 3, 1998},
  year      = {1998},
  crossref  = {DBLP:conf/uwec/1998},
  url       = {https://www.usenix.org/conference/3rd-usenix-workshop-electronic-commerce/detecting-hit-shaving-click-through-payment},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uwec/ReiterAM98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1998,
  editor    = {Li Gong and
               Michael K. Reiter},
  title     = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
               Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  publisher = {{ACM}},
  year      = {1998},
  url       = {http://dl.acm.org/citation.cfm?id=288090},
  isbn      = {1-58113-007-4},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MalkhiR97,
  author    = {Dahlia Malkhi and
               Michael K. Reiter},
  title     = {A High-Throughput Secure Reliable Multicast Protocol},
  journal   = {Journal of Computer Security},
  volume    = {5},
  number    = {2},
  pages     = {113--128},
  year      = {1997},
  url       = {https://doi.org/10.3233/JCS-1997-5203},
  doi       = {10.3233/JCS-1997-5203},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/MalkhiR97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FranklinR97,
  author    = {Matthew K. Franklin and
               Michael K. Reiter},
  title     = {Fair Exchange with a Semi-Trusted Third Party (extended abstract)},
  booktitle = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
               Communications Security, Zurich, Switzerland, April 1-4, 1997.},
  pages     = {1--5},
  year      = {1997},
  crossref  = {DBLP:conf/ccs/1997},
  url       = {https://doi.org/10.1145/266420.266424},
  doi       = {10.1145/266420.266424},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/FranklinR97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ReiterS97,
  author    = {Michael K. Reiter and
               Stuart G. Stubblebine},
  title     = {Path Independence for Authentication in Large-Scale Systems},
  booktitle = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
               Communications Security, Zurich, Switzerland, April 1-4, 1997.},
  pages     = {57--66},
  year      = {1997},
  crossref  = {DBLP:conf/ccs/1997},
  url       = {https://doi.org/10.1145/266420.266435},
  doi       = {10.1145/266420.266435},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ReiterS97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MalkhiR97,
  author    = {Dahlia Malkhi and
               Michael K. Reiter},
  title     = {Unreliable Intrusion Detection in Distributed Computations},
  booktitle = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12,
               1997, Rockport, Massachusetts, {USA}},
  pages     = {116--125},
  year      = {1997},
  crossref  = {DBLP:conf/csfw/1997},
  url       = {https://doi.org/10.1109/CSFW.1997.596799},
  doi       = {10.1109/CSFW.1997.596799},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/MalkhiR97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/MalkhiRW97,
  author    = {Dahlia Malkhi and
               Michael K. Reiter and
               Avishai Wool},
  title     = {The Load and Availability of Byzantine Quorum Systems},
  booktitle = {Proceedings of the Sixteenth Annual {ACM} Symposium on Principles
               of Distributed Computing, Santa Barbara, California, USA, August 21-24,
               1997},
  pages     = {249--257},
  year      = {1997},
  crossref  = {DBLP:conf/podc/1997},
  url       = {https://doi.org/10.1145/259380.259450},
  doi       = {10.1145/259380.259450},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/podc/MalkhiRW97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/MalkhiRW97a,
  author    = {Dahlia Malkhi and
               Michael K. Reiter and
               Rebecca N. Wright},
  title     = {Probabilistic Quorum Systems},
  booktitle = {Proceedings of the Sixteenth Annual {ACM} Symposium on Principles
               of Distributed Computing, Santa Barbara, California, USA, August 21-24,
               1997},
  pages     = {267--273},
  year      = {1997},
  crossref  = {DBLP:conf/podc/1997},
  url       = {https://doi.org/10.1145/259380.259458},
  doi       = {10.1145/259380.259458},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/podc/MalkhiRW97a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ReiterS97,
  author    = {Michael K. Reiter and
               Stuart G. Stubblebine},
  title     = {Toward Acceptable Metrics of Authentication},
  booktitle = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland,
               CA, {USA}},
  pages     = {10--20},
  year      = {1997},
  crossref  = {DBLP:conf/sp/1997},
  url       = {https://doi.org/10.1109/SECPRI.1997.601308},
  doi       = {10.1109/SECPRI.1997.601308},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/ReiterS97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/MalkhiR97,
  author    = {Dahlia Malkhi and
               Michael K. Reiter},
  title     = {Byzantine Quorum Systems},
  booktitle = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory
               of Computing, El Paso, Texas, USA, May 4-6, 1997},
  pages     = {569--578},
  year      = {1997},
  crossref  = {DBLP:conf/stoc/1997},
  url       = {https://doi.org/10.1145/258533.258650},
  doi       = {10.1145/258533.258650},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/MalkhiR97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Reiter96,
  author    = {Michael K. Reiter},
  title     = {Distributed Trust with the Rampart Toolkit},
  journal   = {Commun. {ACM}},
  volume    = {39},
  number    = {4},
  pages     = {71--74},
  year      = {1996},
  url       = {https://doi.org/10.1145/227210.227228},
  doi       = {10.1145/227210.227228},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cacm/Reiter96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ReiterFLW96,
  author    = {Michael K. Reiter and
               Matthew K. Franklin and
               John B. Lacy and
               Rebecca N. Wright},
  title     = {The Omega Key Management Service},
  journal   = {Journal of Computer Security},
  volume    = {4},
  number    = {4},
  pages     = {267--288},
  year      = {1996},
  url       = {https://doi.org/10.3233/JCS-1996-4402},
  doi       = {10.3233/JCS-1996-4402},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/ReiterFLW96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/Reiter96,
  author    = {Michael K. Reiter},
  title     = {A Secure Group Membership Protocol},
  journal   = {{IEEE} Trans. Software Eng.},
  volume    = {22},
  number    = {1},
  pages     = {31--42},
  year      = {1996},
  url       = {https://doi.org/10.1109/32.481515},
  doi       = {10.1109/32.481515},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tse/Reiter96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/FranklinR96,
  author    = {Matthew K. Franklin and
               Michael K. Reiter},
  title     = {The Design and Implementation of a Secure Auction Service},
  journal   = {{IEEE} Trans. Software Eng.},
  volume    = {22},
  number    = {5},
  pages     = {302--312},
  year      = {1996},
  url       = {https://doi.org/10.1109/32.502223},
  doi       = {10.1109/32.502223},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tse/FranklinR96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ReiterFLW96,
  author    = {Michael K. Reiter and
               Matthew K. Franklin and
               John B. Lacy and
               Rebecca N. Wright},
  title     = {The Omega Key Management Service},
  booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
               Communications Security, New Delhi, India, March 14-16, 1996.},
  pages     = {38--47},
  year      = {1996},
  crossref  = {DBLP:conf/ccs/1996},
  url       = {https://doi.org/10.1145/238168.238184},
  doi       = {10.1145/238168.238184},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ReiterFLW96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MalkiR96,
  author    = {Dalia Malki and
               Michael K. Reiter},
  title     = {A High-Throughput Secure Reliable Multicast Protocol},
  booktitle = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
               1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages     = {9--17},
  year      = {1996},
  crossref  = {DBLP:conf/csfw/1996},
  url       = {https://doi.org/10.1109/CSFW.1996.503686},
  doi       = {10.1109/CSFW.1996.503686},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/MalkiR96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CoppersmithFPR96,
  author    = {Don Coppersmith and
               Matthew K. Franklin and
               Jacques Patarin and
               Michael K. Reiter},
  title     = {Low-Exponent {RSA} with Related Messages},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
               on the Theory and Application of Cryptographic Techniques, Saragossa,
               Spain, May 12-16, 1996, Proceeding},
  pages     = {1--9},
  year      = {1996},
  crossref  = {DBLP:conf/eurocrypt/96},
  url       = {https://doi.org/10.1007/3-540-68339-9\_1},
  doi       = {10.1007/3-540-68339-9\_1},
  timestamp = {Mon, 22 May 2017 16:14:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CoppersmithFPR96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ReiterG95,
  author    = {Michael K. Reiter and
               Li Gong},
  title     = {Securing Causal Relationships in Distributed Systems},
  journal   = {Comput. J.},
  volume    = {38},
  number    = {8},
  pages     = {633--642},
  year      = {1995},
  url       = {https://doi.org/10.1093/comjnl/38.8.633},
  doi       = {10.1093/comjnl/38.8.633},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/ReiterG95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FranklinR95,
  author    = {Matthew K. Franklin and
               Michael K. Reiter},
  title     = {Verifiable Signature Sharing},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
               on the Theory and Application of Cryptographic Techniques, Saint-Malo,
               France, May 21-25, 1995, Proceeding},
  pages     = {50--63},
  year      = {1995},
  crossref  = {DBLP:conf/eurocrypt/95},
  url       = {https://doi.org/10.1007/3-540-49264-X\_5},
  doi       = {10.1007/3-540-49264-X\_5},
  timestamp = {Mon, 22 May 2017 12:56:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/FranklinR95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FranklinR95,
  author    = {Matthew K. Franklin and
               Michael K. Reiter},
  title     = {The design and implementation of a secure auction service},
  booktitle = {Proceedings of the 1995 {IEEE} Symposium on Security and Privacy,
               Oakland, California, USA, May 8-10, 1995},
  pages     = {2--14},
  year      = {1995},
  crossref  = {DBLP:conf/sp/1995},
  url       = {https://doi.org/10.1109/SECPRI.1995.398918},
  doi       = {10.1109/SECPRI.1995.398918},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/FranklinR95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/ReiterBR94,
  author    = {Michael K. Reiter and
               Kenneth P. Birman and
               Robbert van Renesse},
  title     = {A Security Architecture for Fault-Toerant Systems},
  journal   = {{ACM} Trans. Comput. Syst.},
  volume    = {12},
  number    = {4},
  pages     = {340--371},
  year      = {1994},
  url       = {https://doi.org/10.1145/195792.195823},
  doi       = {10.1145/195792.195823},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tocs/ReiterBR94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/ReiterB94,
  author    = {Michael K. Reiter and
               Kenneth P. Birman},
  title     = {How to Securely Replicate Services},
  journal   = {{ACM} Trans. Program. Lang. Syst.},
  volume    = {16},
  number    = {3},
  pages     = {986--1009},
  year      = {1994},
  url       = {https://doi.org/10.1145/177492.177745},
  doi       = {10.1145/177492.177745},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/toplas/ReiterB94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Reiter94,
  author    = {Michael K. Reiter},
  title     = {Secure Agreement Protocols: Reliable and Atomic Group Multicast in
               Rampart},
  booktitle = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and
               Communications Security, Fairfax, Virginia, USA, November 2-4, 1994.},
  pages     = {68--80},
  year      = {1994},
  crossref  = {DBLP:conf/ccs/1994},
  url       = {https://doi.org/10.1145/191177.191194},
  doi       = {10.1145/191177.191194},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Reiter94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/Reiter94,
  author    = {Michael K. Reiter},
  title     = {The Rampart Toolkit for Building High-Integrity Services},
  booktitle = {Theory and Practice in Distributed Systems, International Workshop,
               Dagstuhl Castle, Germany, September 5-9, 1994, Selected Papers},
  pages     = {99--110},
  year      = {1994},
  crossref  = {DBLP:conf/dagstuhl/1994ds},
  url       = {https://doi.org/10.1007/3-540-60042-6\_7},
  doi       = {10.1007/3-540-60042-6\_7},
  timestamp = {Sat, 20 May 2017 15:32:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/Reiter94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Reiter94,
  author    = {Michael K. Reiter},
  title     = {A secure group membership protocol},
  booktitle = {1994 {IEEE} Computer Society Symposium on Research in Security and
               Privacy, Oakland, CA, USA, May 16-18, 1994},
  pages     = {176--189},
  year      = {1994},
  crossref  = {DBLP:conf/sp/1994},
  url       = {https://doi.org/10.1109/RISP.1994.296582},
  doi       = {10.1109/RISP.1994.296582},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/Reiter94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ReiterG93,
  author    = {Michael K. Reiter and
               Li Gong},
  title     = {Preventing denial and forgery of causal relationships in distributed
               systems},
  booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and
               Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages     = {30--40},
  year      = {1993},
  crossref  = {DBLP:conf/sp/1993},
  url       = {https://doi.org/10.1109/RISP.1993.287645},
  doi       = {10.1109/RISP.1993.287645},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/ReiterG93},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Reiter92,
  author    = {Michael K. Reiter},
  title     = {Integrating Security in a Group Oriented Distributed System (Abstract)},
  journal   = {Operating Systems Review},
  volume    = {26},
  number    = {2},
  pages     = {27},
  year      = {1992},
  url       = {https://doi.org/10.1145/142111.993266},
  doi       = {10.1145/142111.993266},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/Reiter92},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ReiterBG92,
  author    = {Michael K. Reiter and
               Kenneth P. Birman and
               Li Gong},
  title     = {Integrating security in a group oriented distributed system},
  booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and
               Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages     = {18--32},
  year      = {1992},
  crossref  = {DBLP:conf/sp/1992},
  url       = {https://doi.org/10.1109/RISP.1992.213273},
  doi       = {10.1109/RISP.1992.213273},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/ReiterBG92},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018,
  editor    = {David Lie and
               Mohammad Mannan and
               Michael Backes and
               XiaoFeng Wang},
  title     = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3243734},
  isbn      = {978-1-4503-5693-0},
  timestamp = {Wed, 31 Oct 2018 17:23:34 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/conext/2018,
  editor    = {Xenofontas A. Dimitropoulos and
               Alberto Dainotti and
               Laurent Vanbever and
               Theophilus Benson},
  title     = {Proceedings of the 14th International Conference on emerging Networking
               EXperiments and Technologies, CoNEXT 2018, Heraklion, Greece, December
               04-07, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3281411},
  isbn      = {978-1-4503-6080-7},
  timestamp = {Wed, 28 Nov 2018 07:38:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/conext/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cvpr/2018w,
  title     = {2018 {IEEE} Conference on Computer Vision and Pattern Recognition
               Workshops, {CVPR} Workshops 2018, Salt Lake City, UT, USA, June 18-22,
               2018},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {http://openaccess.thecvf.com/CVPR2018\_workshops/menu.py},
  timestamp = {Mon, 07 Jan 2019 12:43:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cvpr/2018w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/2018,
  title     = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
               Honolulu, HI, USA, April 16-19, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8464035},
  isbn      = {978-1-5386-4128-6},
  timestamp = {Fri, 12 Oct 2018 12:47:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2018,
  title     = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
               21-23 May 2018, San Francisco, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8418581},
  isbn      = {978-1-5386-4353-2},
  timestamp = {Thu, 14 Feb 2019 16:15:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017asia,
  editor    = {Ramesh Karri and
               Ozgur Sinanoglu and
               Ahmad{-}Reza Sadeghi and
               Xun Yi},
  title     = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3052973},
  doi       = {10.1145/3052973},
  isbn      = {978-1-4503-4944-4},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2017,
  title     = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
               and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8019912},
  isbn      = {978-1-5386-0542-4},
  timestamp = {Tue, 05 Sep 2017 17:42:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2017-2,
  editor    = {Simon N. Foley and
               Dieter Gollmann and
               Einar Snekkenes},
  title     = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
               in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10493},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-66399-9},
  doi       = {10.1007/978-3-319-66399-9},
  isbn      = {978-3-319-66398-2},
  timestamp = {Fri, 01 Sep 2017 14:18:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2017,
  editor    = {Kisung Lee and
               Ling Liu},
  title     = {37th {IEEE} International Conference on Distributed Computing Systems,
               {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7976702},
  isbn      = {978-1-5386-1792-2},
  timestamp = {Fri, 21 Jul 2017 13:46:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nsdi/2017,
  editor    = {Aditya Akella and
               Jon Howell},
  title     = {14th {USENIX} Symposium on Networked Systems Design and Implementation,
               {NSDI} 2017, Boston, MA, USA, March 27-29, 2017},
  publisher = {{USENIX} Association},
  year      = {2017},
  url       = {https://www.usenix.org/conference/nsdi17},
  isbn      = {978-1-931971-37-9},
  timestamp = {Tue, 28 Mar 2017 15:12:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2016,
  editor    = {Jens Grossklags and
               Bart Preneel},
  title     = {Financial Cryptography and Data Security - 20th International Conference,
               {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9603},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-662-54970-4},
  doi       = {10.1007/978-3-662-54970-4},
  isbn      = {978-3-662-54969-8},
  timestamp = {Wed, 17 May 2017 11:08:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2016,
  title     = {36th {IEEE} International Conference on Distributed Computing Systems,
               {ICDCS} 2016, Nara, Japan, June 27-30, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7529829},
  isbn      = {978-1-5090-1483-5},
  timestamp = {Tue, 20 Sep 2016 12:04:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nsdi/2016,
  editor    = {Katerina J. Argyraki and
               Rebecca Isaacs},
  title     = {13th {USENIX} Symposium on Networked Systems Design and Implementation,
               {NSDI} 2016, Santa Clara, CA, USA, March 16-18, 2016},
  publisher = {{USENIX} Association},
  year      = {2016},
  url       = {https://www.usenix.org/conference/nsdi16},
  isbn      = {978-1-931971-29-4},
  timestamp = {Tue, 28 Mar 2017 14:03:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcse/2016,
  editor    = {Carl Alphonce and
               Jodi Tims and
               Michael E. Caspersen and
               Stephen H. Edwards},
  title     = {Proceedings of the 47th {ACM} Technical Symposium on Computing Science
               Education, Memphis, TN, USA, March 02 - 05, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2839509},
  isbn      = {978-1-4503-3685-7},
  timestamp = {Wed, 01 Feb 2017 15:38:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcse/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2016,
  editor    = {Thorsten Holz and
               Stefan Savage},
  title     = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016},
  publisher = {{USENIX} Association},
  year      = {2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ancs/2015,
  editor    = {Gordon J. Brebner and
               Alex Bachmutsky and
               Chita R. Das},
  title     = {Proceedings of the Eleventh {ACM/IEEE} Symposium on Architectures
               for networking and communications systems, {ANCS} 2015, Oakland, CA,
               USA, May 7-8, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7106213},
  isbn      = {978-1-4673-6632-8},
  timestamp = {Tue, 18 Jul 2017 06:59:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ancs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015ccsw,
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren and
               Florian Kerschbaum and
               Cristina Nita{-}Rotaru},
  title     = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security
               Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808425},
  doi       = {10.1145/2808425},
  isbn      = {978-1-4503-3825-7},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015ccsw},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015,
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2810103},
  isbn      = {978-1-4503-3832-5},
  timestamp = {Wed, 11 Apr 2018 11:09:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2015,
  editor    = {Bo Begole and
               Jinwoo Kim and
               Kori Inkpen and
               Woontack Woo},
  title     = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in
               Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23,
               2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2702123},
  isbn      = {978-1-4503-3145-6},
  timestamp = {Sun, 19 Apr 2015 12:50:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chi/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/coinco/2015,
  title     = {{IEEE} Conference on Collaboration and Internet Computing, {CIC} 2015,
               Hangzhou, China, October 27-30, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7422214},
  isbn      = {978-1-5090-0089-0},
  timestamp = {Fri, 23 Dec 2016 10:37:02 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/coinco/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2015,
  title     = {35th {IEEE} International Conference on Distributed Computing Systems,
               {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7164874},
  isbn      = {978-1-4673-7214-5},
  timestamp = {Tue, 03 May 2016 13:43:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/soups/2015,
  editor    = {Lorrie Faith Cranor and
               Robert Biddle and
               Sunny Consolvo},
  title     = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa,
               Canada, July 22-24, 2015},
  publisher = {{USENIX} Association},
  year      = {2015},
  url       = {https://www.usenix.org/conference/soups2015},
  isbn      = {978-1-931971-249},
  timestamp = {Wed, 05 Apr 2017 12:53:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/soups/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014,
  editor    = {Gail{-}Joon Ahn and
               Moti Yung and
               Ninghui Li},
  title     = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2660267},
  isbn      = {978-1-4503-2957-6},
  timestamp = {Mon, 10 Nov 2014 10:57:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/colcom/2014,
  editor    = {Elisa Bertino and
               Shu{-}Ching Chen and
               Karl Aberer and
               Prashant Krishnamurthy and
               Murat Kantarcioglu},
  title     = {10th {IEEE} International Conference on Collaborative Computing: Networking,
               Applications and Worksharing, CollaborateCom 2014, Miami, Florida,
               USA, October 22-25, 2014},
  publisher = {{ICST} / {IEEE}},
  year      = {2014},
  url       = {http://eudl.eu/proceedings/COLLABORATECOM/2014},
  isbn      = {978-1-63190-043-3},
  timestamp = {Mon, 09 Mar 2015 17:31:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fast/2014,
  editor    = {Bianca Schroeder and
               Eno Thereska},
  title     = {Proceedings of the 12th {USENIX} conference on File and Storage Technologies,
               {FAST} 2014, Santa Clara, CA, USA, February 17-20, 2014},
  publisher = {{USENIX}},
  year      = {2014},
  url       = {https://www.usenix.org/conference/fast14},
  isbn      = {978-1-931971-08-9},
  timestamp = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fast/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2014,
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1},
  doi       = {10.1007/978-3-319-13841-1},
  isbn      = {978-3-319-13840-4},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bigdataconf/2013,
  editor    = {Xiaohua Hu and
               Tsau Young Lin and
               Vijay V. Raghavan and
               Benjamin W. Wah and
               Ricardo A. Baeza{-}Yates and
               Geoffrey C. Fox and
               Cyrus Shahabi and
               Matthew Smith and
               Qiang Yang and
               Rayid Ghani and
               Wei Fan and
               Ronny Lempel and
               Raghunath Nambiar},
  title     = {Proceedings of the 2013 {IEEE} International Conference on Big Data,
               6-9 October 2013, Santa Clara, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6679357},
  isbn      = {978-1-4799-1292-6},
  timestamp = {Wed, 20 Feb 2019 16:54:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/bigdataconf/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2508859},
  isbn      = {978-1-4503-2477-9},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/conext/2013hotmiddlebox,
  editor    = {Felipe Huici and
               Vyas Sekar},
  title     = {Proceedings of the 2013 workshop on Hot topics in middleboxes and
               network function virtualization, HotMiddlebox 2013, Santa Barbara,
               California, USA, December 9, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2535828},
  doi       = {10.1145/2535828},
  isbn      = {978-1-4503-2574-5},
  timestamp = {Tue, 06 Nov 2018 16:58:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/conext/2013hotmiddlebox},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2013,
  title     = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
               Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6569391},
  isbn      = {978-1-4673-6471-3},
  timestamp = {Thu, 31 Mar 2016 11:12:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2013,
  editor    = {Jason Crampton and
               Sushil Jajodia and
               Keith Mayes},
  title     = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
               in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8134},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40203-6},
  doi       = {10.1007/978-3-642-40203-6},
  isbn      = {978-3-642-40202-9},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2013,
  title     = {20th Annual Network and Distributed System Security Symposium, {NDSS}
               2013, San Diego, California, USA, February 24-27, 2013},
  publisher = {The Internet Society},
  year      = {2013},
  url       = {https://www.ndss-symposium.org/ndss2013/},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Sara Foresti},
  title     = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2517840},
  isbn      = {978-1-4503-2485-4},
  timestamp = {Fri, 22 Nov 2013 19:47:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn      = {978-1-4503-1651-4},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2012,
  editor    = {Joseph A. Konstan and
               Ed H. Chi and
               Kristina H{\"{o}}{\"{o}}k},
  title     = {{CHI} Conference on Human Factors in Computing Systems, {CHI} '12,
               Austin, TX, {USA} - May 05 - 10, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2207676},
  isbn      = {978-1-4503-1015-4},
  timestamp = {Mon, 07 May 2012 08:05:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chi/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2012,
  editor    = {Elisa Bertino and
               Ravi S. Sandhu},
  title     = {Second {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2133601},
  isbn      = {978-1-4503-1091-8},
  timestamp = {Tue, 20 Mar 2012 08:30:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/conext/2012,
  editor    = {Chadi Barakat and
               Renata Teixeira and
               K. K. Ramakrishnan and
               Patrick Thiran},
  title     = {Conference on emerging Networking Experiments and Technologies, CoNEXT
               '12, Nice, France - December 10 - 13, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2413176},
  isbn      = {978-1-4503-1775-7},
  timestamp = {Thu, 13 Dec 2012 12:41:03 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/conext/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2012,
  editor    = {Sara Foresti and
               Moti Yung and
               Fabio Martinelli},
  title     = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
               in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7459},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33167-1},
  doi       = {10.1007/978-3-642-33167-1},
  isbn      = {978-3-642-33166-4},
  timestamp = {Fri, 02 Jun 2017 20:48:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2012,
  editor    = {Angelos D. Keromytis},
  title     = {Financial Cryptography and Data Security - 16th International Conference,
               {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7397},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32946-3},
  doi       = {10.1007/978-3-642-32946-3},
  isbn      = {978-3-642-32945-6},
  timestamp = {Fri, 26 May 2017 00:50:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nsdi/2012,
  editor    = {Steven D. Gribble and
               Dina Katabi},
  title     = {Proceedings of the 9th {USENIX} Symposium on Networked Systems Design
               and Implementation, {NSDI} 2012, San Jose, CA, USA, April 25-27, 2012},
  publisher = {{USENIX} Association},
  year      = {2012},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2012,
  editor    = {Pierpaolo Degano and
               Joshua D. Guttman},
  title     = {Principles of Security and Trust - First International Conference,
               {POST} 2012, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
               - April 1, 2012, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7215},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28641-4},
  doi       = {10.1007/978-3-642-28641-4},
  isbn      = {978-3-642-28640-7},
  timestamp = {Wed, 24 May 2017 08:30:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pst/2012,
  editor    = {Nora Cuppens{-}Boulahia and
               Philip Fong and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Stephen Marsh and
               Jan{-}Philipp Stegh{\"{o}}fer},
  title     = {Tenth Annual International Conference on Privacy, Security and Trust,
               {PST} 2012, Paris, France, July 16-18, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6287257},
  isbn      = {978-1-4673-2323-9},
  timestamp = {Fri, 23 Dec 2016 13:11:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pst/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011asia,
  editor    = {Bruce S. N. Cheung and
               Lucas Chi Kwong Hui and
               Ravi S. Sandhu and
               Duncan S. Wong},
  title     = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
               2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0564-8},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2011,
  editor    = {Desney S. Tan and
               Saleema Amershi and
               Bo Begole and
               Wendy A. Kellogg and
               Manas Tungare},
  title     = {Proceedings of the International Conference on Human Factors in Computing
               Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0228-9},
  timestamp = {Wed, 11 May 2011 08:48:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chi/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2011,
  title     = {Proceedings of the 2011 {IEEE/IFIP} International Conference on Dependable
               Systems and Networks, {DSN} 2011, Hong Kong, China, June 27-30 2011},
  publisher = {{IEEE} Compute Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5949577},
  isbn      = {978-1-4244-9233-6},
  timestamp = {Thu, 31 Mar 2016 11:12:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotnets/2011,
  editor    = {Hari Balakrishnan and
               Dina Katabi and
               Aditya Akella and
               Ion Stoica},
  title     = {Tenth {ACM} Workshop on Hot Topics in Networks (HotNets-X), {HOTNETS}
               '11, Cambridge, MA, {USA} - November 14 - 15, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2070562},
  isbn      = {978-1-4503-1059-8},
  timestamp = {Tue, 22 May 2012 17:29:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2011,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
               2011},
  publisher = {The Internet Society},
  year      = {2011},
  url       = {http://www.isoc.org/isoc/conferences/ndss/11/},
  timestamp = {Wed, 31 Aug 2011 14:05:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2011,
  title     = {32nd {IEEE} Symposium on Security and Privacy, S{\&}P 2011, 22-25
               May 2011, Berkeley, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5955408},
  isbn      = {978-1-4577-0147-4},
  timestamp = {Thu, 08 Jan 2015 16:59:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010,
  editor    = {Ehab Al{-}Shaer and
               Angelos D. Keromytis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0245-6},
  timestamp = {Mon, 22 Nov 2010 20:51:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2010,
  editor    = {Elizabeth D. Mynatt and
               Don Schoner and
               Geraldine Fitzpatrick and
               Scott E. Hudson and
               W. Keith Edwards and
               Tom Rodden},
  title     = {Proceedings of the 28th International Conference on Human Factors
               in Computing Systems, {CHI} 2010, Atlanta, Georgia, USA, April 10-15,
               2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-60558-929-9},
  timestamp = {Tue, 25 Jan 2011 15:47:54 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/conext/2010,
  editor    = {Jaudelice Cavalcante de Oliveira and
               Maximilian Ott and
               Timothy G. Griffin and
               Muriel M{\'{e}}dard},
  title     = {Proceedings of the 2010 {ACM} Conference on Emerging Networking Experiments
               and Technology, CoNEXT 2010, Philadelphia, PA, USA, November 30 -
               December 03, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0448-1},
  timestamp = {Tue, 11 Jan 2011 11:21:30 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/conext/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2010,
  title     = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable
               Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July
               1 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5532324},
  isbn      = {978-1-4244-7501-8},
  timestamp = {Thu, 23 Jun 2016 15:53:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2010,
  title     = {2010 International Conference on Distributed Computing Systems, {ICDCS}
               2010, Genova, Italy, June 21-25, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5541617},
  isbn      = {978-0-7695-4059-7},
  timestamp = {Thu, 11 Dec 2014 17:34:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2010,
  editor    = {Mark Allman},
  title     = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2010, Melbourne, Australia - November 1-3, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0483-2},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2010,
  editor    = {Mike Burmester and
               Gene Tsudik and
               Spyros S. Magliveras and
               Ivana Ilic},
  title     = {Information Security - 13th International Conference, {ISC} 2010,
               Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6531},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-18178-8},
  doi       = {10.1007/978-3-642-18178-8},
  isbn      = {978-3-642-18177-1},
  timestamp = {Sun, 21 May 2017 00:20:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2010,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
               2010},
  publisher = {The Internet Society},
  year      = {2010},
  url       = {http://www.isoc.org/isoc/conferences/ndss/10/},
  timestamp = {Wed, 31 Aug 2011 13:59:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2010,
  editor    = {Somesh Jha and
               Robin Sommer and
               Christian Kreibich},
  title     = {Recent Advances in Intrusion Detection, 13th International Symposium,
               {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6307},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15512-3},
  doi       = {10.1007/978-3-642-15512-3},
  isbn      = {978-3-642-15511-6},
  timestamp = {Tue, 23 May 2017 01:12:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/replication/2010,
  editor    = {Bernadette Charron{-}Bost and
               Fernando Pedone and
               Andr{\'{e}} Schiper},
  title     = {Replication: Theory and Practice},
  series    = {Lecture Notes in Computer Science},
  volume    = {5959},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-11294-2},
  doi       = {10.1007/978-3-642-11294-2},
  isbn      = {978-3-642-11293-5},
  timestamp = {Fri, 26 May 2017 00:49:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/replication/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2010,
  editor    = {Kai Rannenberg and
               Vijay Varadharajan and
               Christian Weber},
  title     = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
               International Information Security Conference, {SEC} 2010, Held as
               Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {330},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15257-3},
  doi       = {10.1007/978-3-642-15257-3},
  isbn      = {978-3-642-15256-6},
  timestamp = {Fri, 19 May 2017 01:25:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009,
  editor    = {Ehab Al{-}Shaer and
               Somesh Jha and
               Angelos D. Keromytis},
  title     = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-894-0},
  timestamp = {Wed, 25 Nov 2009 10:26:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2009,
  editor    = {Dan R. Olsen Jr. and
               Richard B. Arthur and
               Ken Hinckley and
               Meredith Ringel Morris and
               Scott E. Hudson and
               Saul Greenberg},
  title     = {Proceedings of the 27th International Conference on Human Factors
               in Computing Systems, {CHI} 2009, Boston, MA, USA, April 4-9, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-246-7},
  timestamp = {Mon, 26 Feb 2018 13:34:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2009,
  editor    = {Ulrich Flegel and
               Danilo Bruschi},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
               2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5587},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02918-9},
  doi       = {10.1007/978-3-642-02918-9},
  isbn      = {978-3-642-02917-2},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2009,
  editor    = {Michael Backes and
               Peng Ning},
  title     = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
               in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5789},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04444-1},
  doi       = {10.1007/978-3-642-04444-1},
  isbn      = {978-3-642-04443-4},
  timestamp = {Tue, 23 May 2017 01:07:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2009,
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6},
  doi       = {10.1007/978-3-642-10772-6},
  isbn      = {978-3-642-10771-9},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2009,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
               2009},
  publisher = {The Internet Society},
  year      = {2009},
  timestamp = {Thu, 18 Jun 2009 21:33:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2009,
  editor    = {Engin Kirda and
               Somesh Jha and
               Davide Balzarotti},
  title     = {Recent Advances in Intrusion Detection, 12th International Symposium,
               {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5758},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04342-0},
  doi       = {10.1007/978-3-642-04342-0},
  isbn      = {978-3-642-04341-3},
  timestamp = {Tue, 23 May 2017 01:12:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2009,
  editor    = {Barbara Carminati and
               James Joshi},
  title     = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  publisher = {{ACM}},
  year      = {2009},
  url       = {https://doi.org/10.1145/1542207},
  doi       = {10.1145/1542207},
  isbn      = {978-1-60558-537-6},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/srds/2009,
  title     = {28th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2009),
               Niagara Falls, New York, USA, September 27-30, 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5283050},
  isbn      = {978-0-7695-3826-6},
  timestamp = {Fri, 09 Jan 2015 14:54:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/srds/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asplos/2008,
  editor    = {Susan J. Eggers and
               James R. Larus},
  title     = {Proceedings of the 13th International Conference on Architectural
               Support for Programming Languages and Operating Systems, {ASPLOS}
               2008, Seattle, WA, USA, March 1-5, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-958-6},
  timestamp = {Tue, 08 Apr 2008 14:29:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asplos/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008,
  editor    = {Peng Ning and
               Paul F. Syverson and
               Somesh Jha},
  title     = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-810-7},
  timestamp = {Tue, 11 Nov 2008 10:39:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2008,
  editor    = {Mary Czerwinski and
               Arnold M. Lund and
               Desney S. Tan},
  title     = {Proceedings of the 2008 Conference on Human Factors in Computing Systems,
               {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-011-1},
  timestamp = {Tue, 08 Apr 2008 08:35:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chi/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2008,
  editor    = {Diego Zamboni},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               5th International Conference, {DIMVA} 2008, Paris, France, July 10-11,
               2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5137},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-70542-0},
  doi       = {10.1007/978-3-540-70542-0},
  isbn      = {978-3-540-70541-3},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2008,
  title     = {The 38th Annual {IEEE/IFIP} International Conference on Dependable
               Systems and Networks, {DSN} 2008, June 24-27, 2008, Anchorage, Alaska,
               USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4610267},
  isbn      = {978-1-4244-2397-2},
  timestamp = {Thu, 31 Mar 2016 11:10:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosys/2008,
  editor    = {Joseph S. Sventek and
               Steven Hand},
  title     = {Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK,
               April 1-4, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-013-5},
  timestamp = {Wed, 02 Apr 2008 12:41:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosys/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2008,
  editor    = {Liqun Chen and
               Mark Dermot Ryan and
               Guilin Wang},
  title     = {Information and Communications Security, 10th International Conference,
               {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5308},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-88625-9},
  doi       = {10.1007/978-3-540-88625-9},
  isbn      = {978-3-540-88624-2},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ipps/2008,
  title     = {22nd {IEEE} International Symposium on Parallel and Distributed Processing,
               {IPDPS} 2008, Miami, Florida USA, April 14-18, 2008},
  publisher = {{IEEE}},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4519061},
  timestamp = {Fri, 01 Aug 2014 14:26:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ipps/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2008,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
               2008},
  publisher = {The Internet Society},
  year      = {2008},
  timestamp = {Thu, 18 Jun 2009 21:33:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nsdi/2008,
  editor    = {Jon Crowcroft and
               Michael Dahlin},
  title     = {5th {USENIX} Symposium on Networked Systems Design {\&} Implementation,
               {NSDI} 2008, April 16-18, 2008, San Francisco, CA, USA, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2008},
  url       = {http://www.usenix.org/nsdi08/},
  isbn      = {978-1-931971-58-4},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/opodis/2008,
  editor    = {Theodore P. Baker and
               Alain Bui and
               S{\'{e}}bastien Tixeuil},
  title     = {Principles of Distributed Systems, 12th International Conference,
               {OPODIS} 2008, Luxor, Egypt, December 15-18, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5401},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-92221-6},
  doi       = {10.1007/978-3-540-92221-6},
  isbn      = {978-3-540-92220-9},
  timestamp = {Wed, 14 Nov 2018 10:58:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/opodis/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2008,
  editor    = {Richard Lippmann and
               Engin Kirda and
               Ari Trachtenberg},
  title     = {Recent Advances in Intrusion Detection, 11th International Symposium,
               {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5230},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-87403-4},
  doi       = {10.1007/978-3-540-87403-4},
  isbn      = {978-3-540-87402-7},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2008,
  editor    = {Indrakshi Ray and
               Ninghui Li},
  title     = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1377836},
  doi       = {10.1145/1377836},
  isbn      = {978-1-60558-129-3},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2008,
  editor    = {Paul C. van Oorschot},
  title     = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August
               1, 2008, San Jose, CA, {USA}},
  publisher = {{USENIX} Association},
  year      = {2008},
  isbn      = {978-1-931971-60-7},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2007,
  title     = {The 37th Annual {IEEE/IFIP} International Conference on Dependable
               Systems and Networks, {DSN} 2007, 25-28 June 2007, Edinburgh, UK,
               Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4272934},
  isbn      = {0-7695-2855-4},
  timestamp = {Thu, 31 Mar 2016 11:10:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2007,
  editor    = {Joachim Biskup and
               Javier L{\'{o}}pez},
  title     = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
               In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4734},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74835-9},
  doi       = {10.1007/978-3-540-74835-9},
  isbn      = {978-3-540-74834-2},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2007,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
               2007},
  publisher = {The Internet Society},
  year      = {2007},
  timestamp = {Thu, 16 Apr 2009 21:25:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/podc/2007,
  editor    = {Indranil Gupta and
               Roger Wattenhofer},
  title     = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2007, Portland, Oregon, USA, August
               12-15, 2007},
  publisher = {{ACM}},
  year      = {2007},
  url       = {http://dl.acm.org/citation.cfm?id=1281100},
  isbn      = {978-1-59593-616-5},
  timestamp = {Wed, 23 May 2012 14:26:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/podc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2007,
  editor    = {Christopher Kr{\"{u}}gel and
               Richard Lippmann and
               Andrew J. Clark},
  title     = {Recent Advances in Intrusion Detection, 10th International Symposium,
               {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4637},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74320-0},
  doi       = {10.1007/978-3-540-74320-0},
  isbn      = {978-3-540-74319-4},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sosp/2007,
  editor    = {Thomas C. Bressoud and
               M. Frans Kaashoek},
  title     = {Proceedings of the 21st {ACM} Symposium on Operating Systems Principles
               2007, {SOSP} 2007, Stevenson, Washington, USA, October 14-17, 2007},
  publisher = {{ACM}},
  year      = {2007},
  url       = {https://doi.org/10.1145/1294261},
  doi       = {10.1145/1294261},
  isbn      = {978-1-59593-591-5},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/soups/2007,
  editor    = {Lorrie Faith Cranor},
  title     = {Proceedings of the 3rd Symposium on Usable Privacy and Security, {SOUPS}
               2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007},
  series    = {{ACM} International Conference Proceeding Series},
  volume    = {229},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-801-5},
  timestamp = {Tue, 10 Jun 2008 10:25:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/soups/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2007,
  title     = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
               May 2007, Oakland, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4223200},
  isbn      = {0-7695-2848-1},
  timestamp = {Thu, 08 Jan 2015 16:59:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2007,
  editor    = {Niels Provos},
  title     = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
               August 6-10, 2007},
  publisher = {{USENIX} Association},
  year      = {2007},
  url       = {https://www.usenix.org/legacy/events/sec07/},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wdag/2007,
  editor    = {Andrzej Pelc},
  title     = {Distributed Computing, 21st International Symposium, {DISC} 2007,
               Lemesos, Cyprus, September 24-26, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4731},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-75142-7},
  doi       = {10.1007/978-3-540-75142-7},
  isbn      = {978-3-540-75141-0},
  timestamp = {Wed, 14 Nov 2018 10:59:35 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wdag/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2006,
  title     = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
               11-15 December 2006, Miami Beach, Florida, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4041138},
  isbn      = {0-7695-2716-7},
  timestamp = {Mon, 04 Aug 2014 17:08:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006usa,
  editor    = {Ari Juels and
               Rebecca N. Wright and
               Sabrina De Capitani di Vimercati},
  title     = {Proceedings of the 13th {ACM} Conference on Computer and Communications
               Security, {CCS} 2006, Alexandria, VA, USA, Ioctober 30 - November
               3, 2006},
  publisher = {{ACM}},
  year      = {2006},
  timestamp = {Mon, 11 Dec 2006 11:03:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2006usa},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2006,
  title     = {2006 International Conference on Dependable Systems and Networks {(DSN}
               2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10881},
  isbn      = {0-7695-2607-1},
  timestamp = {Thu, 31 Mar 2016 11:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2006,
  editor    = {Dieter Gollmann and
               Jan Meier and
               Andrei Sabelfeld},
  title     = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
               in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4189},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11863908},
  doi       = {10.1007/11863908},
  isbn      = {3-540-44601-X},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2006,
  title     = {26th {IEEE} International Conference on Distributed Computing Systems
               {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10967},
  isbn      = {0-7695-2540-7},
  timestamp = {Thu, 11 Dec 2014 17:34:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icnp/2006,
  title     = {Proceedings of the 14th {IEEE} International Conference on Network
               Protocols, {ICNP} 2006, November 12-15, 2006, Santa Barbara, California,
               {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4110262},
  isbn      = {1-4244-0593-9},
  timestamp = {Fri, 01 Apr 2016 11:27:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icnp/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/podc/2006,
  editor    = {Eric Ruppert and
               Dahlia Malkhi},
  title     = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2006, Denver, CO, USA, July 23-26,
               2006},
  publisher = {{ACM}},
  year      = {2006},
  url       = {http://dl.acm.org/citation.cfm?id=1146381},
  isbn      = {1-59593-384-0},
  timestamp = {Wed, 23 May 2012 14:26:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/podc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2006,
  editor    = {Diego Zamboni and
               Christopher Kr{\"{u}}gel},
  title     = {Recent Advances in Intrusion Detection, 9th International Symposium,
               {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4219},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11856214},
  doi       = {10.1007/11856214},
  isbn      = {3-540-39723-X},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/srds/2006,
  title     = {25th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2006),2-4
               October 2006, Leeds, {UK}},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4032454},
  isbn      = {0-7695-2677-2},
  timestamp = {Fri, 09 Jan 2015 14:54:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/srds/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/usenix/2006g,
  editor    = {Atul Adya and
               Erich M. Nahum},
  title     = {Proceedings of the 2006 {USENIX} Annual Technical Conference, Boston,
               MA, USA, May 30 - June 3, 2006},
  publisher = {{USENIX}},
  year      = {2006},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/usenix/2006g},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wdag/2006,
  editor    = {Shlomi Dolev},
  title     = {Distributed Computing, 20th International Symposium, {DISC} 2006,
               Stockholm, Sweden, September 18-20, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4167},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11864219},
  doi       = {10.1007/11864219},
  isbn      = {3-540-44624-9},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wdag/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2006P6371,
  editor    = {Christian Cachin and
               Felix C. Freiling and
               Jaap{-}Henk Hoepman},
  title     = {From Security to Dependability, 10.09. - 15.09.2006},
  series    = {Dagstuhl Seminar Proceedings},
  volume    = {06371},
  publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
               (IBFI), Schloss Dagstuhl, Germany},
  year      = {2007},
  url       = {http://drops.dagstuhl.de/portals/06371/},
  timestamp = {Wed, 19 Jun 2013 12:19:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/2006P6371},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2005,
  editor    = {John Ioannidis and
               Angelos D. Keromytis and
               Moti Yung},
  title     = {Applied Cryptography and Network Security, Third International Conference,
               {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3531},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137093},
  doi       = {10.1007/b137093},
  isbn      = {3-540-26223-7},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2005,
  editor    = {Mauro Barni and
               Jordi Herrera{-}Joancomart{\'{\i}} and
               Stefan Katzenbeisser and
               Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title     = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona,
               Spain, June 6-8, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3727},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11558859},
  doi       = {10.1007/11558859},
  isbn      = {3-540-29039-7},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2005,
  editor    = {Jianying Zhou and
               Javier L{\'{o}}pez and
               Robert H. Deng and
               Feng Bao},
  title     = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
               September 20-23, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3650},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11556992},
  doi       = {10.1007/11556992},
  isbn      = {3-540-29001-X},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2005,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2005, San Diego, California, {USA}},
  publisher = {The Internet Society},
  year      = {2005},
  isbn      = {1-891562-20-7},
  timestamp = {Thu, 23 Feb 2006 15:03:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/podc/2005,
  editor    = {Marcos Kawazoe Aguilera and
               James Aspnes},
  title     = {Proceedings of the Twenty-Fourth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2005, Las Vegas, NV, USA, July 17-20,
               2005},
  publisher = {{ACM}},
  year      = {2005},
  url       = {http://dl.acm.org/citation.cfm?id=1073814},
  isbn      = {1-58113-994-2},
  timestamp = {Wed, 23 May 2012 14:26:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/podc/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2005,
  editor    = {Alfonso Valdes and
               Diego Zamboni},
  title     = {Recent Advances in Intrusion Detection, 8th International Symposium,
               {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3858},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11663812},
  doi       = {10.1007/11663812},
  isbn      = {3-540-31778-3},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sosp/2005,
  editor    = {Andrew Herbert and
               Kenneth P. Birman},
  title     = {Proceedings of the 20th {ACM} Symposium on Operating Systems Principles
               2005, {SOSP} 2005, Brighton, UK, October 23-26, 2005},
  publisher = {{ACM}},
  year      = {2005},
  url       = {https://doi.org/10.1145/1095810},
  doi       = {10.1145/1095810},
  isbn      = {1-59593-079-5},
  timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2005,
  title     = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
               May 2005, Oakland, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9752},
  isbn      = {0-7695-2339-0},
  timestamp = {Thu, 08 Jan 2015 16:59:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/srds/2005,
  title     = {24th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2005),26-28
               October 2005, Orlando, FL, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10345},
  isbn      = {0-7695-2463-X},
  timestamp = {Fri, 09 Jan 2015 14:54:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/srds/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2004,
  editor    = {Markus Jakobsson and
               Moti Yung and
               Jianying Zhou},
  title     = {Applied Cryptography and Network Security, Second International Conference,
               {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3089},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98360},
  doi       = {10.1007/b98360},
  isbn      = {3-540-22217-0},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2004ccs,
  editor    = {Vijayalakshmi Atluri and
               Birgit Pfitzmann and
               Patrick D. McDaniel},
  title     = {Proceedings of the 11th {ACM} Conference on Computer and Communications
               Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  publisher = {{ACM}},
  year      = {2004},
  isbn      = {1-58113-961-6},
  timestamp = {Thu, 17 Nov 2016 19:38:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2004ccs},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2004,
  title     = {2004 International Conference on Dependable Systems and Networks {(DSN}
               2004), 28 June - 1 July 2004, Florence, Italy, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9172},
  isbn      = {0-7695-2052-9},
  timestamp = {Thu, 31 Mar 2016 11:08:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2004,
  editor    = {Ari Juels},
  title     = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
               West, FL, USA, February 9-12, 2004. Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3110},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98935},
  doi       = {10.1007/b98935},
  isbn      = {3-540-22420-3},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2004,
  editor    = {Javier L{\'{o}}pez and
               Sihan Qing and
               Eiji Okamoto},
  title     = {Information and Communications Security, 6th International Conference,
               {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3269},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b101042},
  doi       = {10.1007/b101042},
  isbn      = {3-540-23563-9},
  timestamp = {Mon, 07 May 2018 15:01:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2004,
  editor    = {Choonsik Park and
               Seongtaek Chee},
  title     = {Information Security and Cryptology - {ICISC} 2004, 7th International
               Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3506},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137120},
  doi       = {10.1007/b137120},
  isbn      = {3-540-26226-1},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2004,
  editor    = {Erland Jonsson and
               Alfonso Valdes and
               Magnus Almgren},
  title     = {Recent Advances in Intrusion Detection: 7th International Symposium,
               {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3224},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b100714},
  doi       = {10.1007/b100714},
  isbn      = {3-540-23123-4},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2004,
  title     = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
               May 2004, Berkeley, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9120},
  isbn      = {0-7695-2136-3},
  timestamp = {Thu, 08 Jan 2015 16:59:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/srds/2004,
  title     = {23rd International Symposium on Reliable Distributed Systems {(SRDS}
               2004), 18-20 October 2004, Florianpolis, Brazil},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9361},
  isbn      = {0-7695-2239-4},
  timestamp = {Fri, 09 Jan 2015 14:54:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/srds/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2004,
  editor    = {Moni Naor},
  title     = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
               2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2951},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b95566},
  doi       = {10.1007/b95566},
  isbn      = {3-540-21000-8},
  timestamp = {Mon, 29 May 2017 16:53:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2004,
  editor    = {Matt Blaze},
  title     = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
               2004, San Diego, CA, {USA}},
  publisher = {{USENIX}},
  year      = {2004},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2003,
  editor    = {Sushil Jajodia and
               Vijayalakshmi Atluri and
               Trent Jaeger},
  title     = {Proceedings of the 10th {ACM} Conference on Computer and Communications
               Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  publisher = {{ACM}},
  year      = {2003},
  url       = {http://dl.acm.org/citation.cfm?id=948109},
  isbn      = {1-58113-738-9},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2003,
  title     = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
               May 2003, Berkeley, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8543},
  isbn      = {0-7695-1940-7},
  timestamp = {Thu, 08 Jan 2015 16:59:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/srds/2003,
  title     = {22nd Symposium on Reliable Distributed Systems {(SRDS} 2003), 6-8
               October 2003, Florence, Italy},
  publisher = {{IEEE} Computer Society},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8774},
  isbn      = {0-7695-1955-5},
  timestamp = {Fri, 09 Jan 2015 14:54:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/srds/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hpdc/2002,
  title     = {11th {IEEE} International Symposium on High Performance Distributed
               Computing {(HPDC-11} 2002), 23-26 July 2002, Edinburgh, Scotland,
               {UK}},
  publisher = {{IEEE} Computer Society},
  year      = {2002},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7999},
  isbn      = {0-7695-1686-6},
  timestamp = {Wed, 06 Aug 2014 18:21:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hpdc/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2002,
  editor    = {Dan Boneh},
  title     = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
               CA, USA, August 5-9, 2002},
  publisher = {{USENIX}},
  year      = {2002},
  isbn      = {1-931971-00-5},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2001drm,
  editor    = {Tomas Sander},
  title     = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
               {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2320},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-47870-1},
  doi       = {10.1007/3-540-47870-1},
  isbn      = {3-540-43677-4},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2001drm},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2001,
  editor    = {Michael K. Reiter and
               Pierangela Samarati},
  title     = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
               Communications Security, Philadelphia, Pennsylvania, USA, November
               6-8, 2001},
  publisher = {{ACM}},
  year      = {2001},
  url       = {http://dl.acm.org/citation.cfm?id=501983},
  isbn      = {1-58113-385-5},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2001,
  editor    = {Joe Kilian},
  title     = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2139},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44647-8},
  doi       = {10.1007/3-540-44647-8},
  isbn      = {3-540-42456-3},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2001,
  title     = {Proceedings of the 21st International Conference on Distributed Computing
               Systems {(ICDCS} 2001), Phoenix, Arizona, USA, April 16-19, 2001},
  publisher = {{IEEE} Computer Society},
  year      = {2001},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7339},
  isbn      = {0-7695-1077-9},
  timestamp = {Thu, 11 Dec 2014 17:34:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/odyssey/2001,
  title     = {2001: {A} Speaker Odyssey - The Speaker Recognition Workshop, Crete,
               Greece, June 18-22, 2001},
  publisher = {{ISCA}},
  year      = {2001},
  url       = {http://www.isca-speech.org/archive\_open/odyssey/},
  timestamp = {Tue, 11 Mar 2014 17:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/odyssey/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/podc/2001,
  editor    = {Ajay D. Kshemkalyani and
               Nir Shavit},
  title     = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA,
               August 26-29, 2001},
  publisher = {{ACM}},
  year      = {2001},
  url       = {http://dl.acm.org/citation.cfm?id=383962},
  isbn      = {1-58113-383-9},
  timestamp = {Wed, 23 May 2012 17:48:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/podc/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2001,
  title     = {2001 {IEEE} Symposium on Security and Privacy, Oakland, California,
               {USA} May 14-16, 2001},
  publisher = {{IEEE} Computer Society},
  year      = {2001},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7367},
  isbn      = {0-7695-1046-9},
  timestamp = {Thu, 08 Jan 2015 16:59:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/srds/2001,
  title     = {20th Symposium on Reliable Distributed Systems {(SRDS} 2001), 28-31
               October 2001, New Orleans, LA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2001},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7654},
  isbn      = {0-7695-1366-2},
  timestamp = {Fri, 09 Jan 2015 14:54:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/srds/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2000,
  editor    = {Dimitris Gritzalis and
               Sushil Jajodia and
               Pierangela Samarati},
  title     = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
               Communications Security, Athens, Greece, November 1-4, 2000},
  publisher = {{ACM}},
  year      = {2000},
  url       = {http://dl.acm.org/citation.cfm?id=352600},
  isbn      = {1-58113-203-4},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2000,
  title     = {2000 International Conference on Dependable Systems and Networks {(DSN}
               2000) (formerly {FTCS-30} and DCCA-8), 25-28 June 2000, New York,
               NY, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2000},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6928},
  isbn      = {0-7695-0707-7},
  timestamp = {Thu, 31 Mar 2016 11:06:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigecom/2000,
  editor    = {Anant Jhingran and
               Jeff Mackie{-}Mason and
               Doug J. Tygar},
  title     = {Proceedings of the 2nd {ACM} Conference on Electronic Commerce (EC-00),
               Minneapolis, MN, USA, October 17-20, 2000},
  publisher = {{ACM}},
  year      = {2000},
  url       = {https://doi.org/10.1145/352871},
  doi       = {10.1145/352871},
  isbn      = {1-58113-272-7},
  timestamp = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigecom/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wdag/2000,
  editor    = {Maurice Herlihy},
  title     = {Distributed Computing, 14th International Conference, {DISC} 2000,
               Toledo, Spain, October 4-6, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1914},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-40026-5},
  doi       = {10.1007/3-540-40026-5},
  isbn      = {3-540-41143-7},
  timestamp = {Wed, 14 Nov 2018 10:59:35 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wdag/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1999,
  editor    = {Juzar Motiwalla and
               Gene Tsudik},
  title     = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
               Communications Security, Singapore, November 1-4, 1999},
  publisher = {{ACM}},
  year      = {1999},
  url       = {http://dl.acm.org/citation.cfm?id=319709},
  isbn      = {1-58113-148-8},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/podc/1999,
  editor    = {Brian A. Coan and
               Jennifer L. Welch},
  title     = {Proceedings of the Eighteenth Annual {ACM} Symposium on Principles
               of Distributed Computing, PODC, '99Atlanta, Georgia, USA, May 3-6,
               1999},
  publisher = {{ACM}},
  year      = {1999},
  url       = {http://dl.acm.org/citation.cfm?id=301308},
  isbn      = {1-58113-099-6},
  timestamp = {Wed, 23 May 2012 14:26:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/podc/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/srds/1999,
  title     = {The Eighteenth Symposium on Reliable Distributed Systems, {SRDS} 1999,
               Lausanne, Switzerland, October 19-22, 1999, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6512},
  isbn      = {0-7695-0290-3},
  timestamp = {Fri, 09 Jan 2015 14:54:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/srds/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/1999,
  editor    = {G. Winfield Treese},
  title     = {Proceedings of the 8th {USENIX} Security Symposium, Washington, DC,
               USA, August 23-26, 1999},
  publisher = {{USENIX} Association},
  year      = {1999},
  url       = {https://www.usenix.org/conference/8thusenixsecuritysymposium},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/podc/1998,
  editor    = {Brian A. Coan and
               Yehuda Afek},
  title     = {Proceedings of the Seventeenth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} '98, Puerto Vallarta, Mexico, June
               28 - July 2, 1998},
  publisher = {{ACM}},
  year      = {1998},
  url       = {http://dl.acm.org/citation.cfm?id=277697},
  isbn      = {0-89791-977-7},
  timestamp = {Wed, 23 May 2012 14:26:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/podc/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1998,
  title     = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy,
               Oakland, CA, USA, May 3-6, 1998, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1998},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5528},
  isbn      = {0-8186-8386-4},
  timestamp = {Thu, 08 Jan 2015 16:59:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/srds/1998,
  title     = {The Seventeenth Symposium on Reliable Distributed Systems, {SRDS}
               1998, West Lafayette, Indiana, USA, October 20-22, 1998, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1998},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5971},
  isbn      = {0-8186-9218-9},
  timestamp = {Fri, 09 Jan 2015 14:54:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/srds/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uwec/1998,
  editor    = {Bennet S. Yee},
  title     = {Proceedings of the 3rd {USENIX} Workshop on Electronic Commerce, Boston,
               Massachusetts, USA, August 31 - September 3, 1998},
  publisher = {{USENIX} Association},
  year      = {1998},
  url       = {https://www.usenix.org/conference/3rdusenixworkshoponelectroniccommerce},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uwec/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1997,
  editor    = {Richard Graveman and
               Philippe A. Janson and
               Clifford Neuman and
               Li Gong},
  title     = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
               Communications Security, Zurich, Switzerland, April 1-4, 1997},
  publisher = {{ACM}},
  year      = {1997},
  url       = {http://dl.acm.org/citation.cfm?id=266420},
  isbn      = {0-89791-912-2},
  timestamp = {Mon, 07 Nov 2016 19:48:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/1997,
  title     = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12,
               1997, Rockport, Massachusetts, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {1997},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4668},
  isbn      = {0-8186-7990-5},
  timestamp = {Fri, 13 May 2016 11:53:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/podc/1997,
  editor    = {James E. Burns and
               Hagit Attiya},
  title     = {Proceedings of the Sixteenth Annual {ACM} Symposium on Principles
               of Distributed Computing, Santa Barbara, California, USA, August 21-24,
               1997},
  publisher = {{ACM}},
  year      = {1997},
  url       = {http://dl.acm.org/citation.cfm?id=259380},
  isbn      = {0-89791-952-1},
  timestamp = {Wed, 23 May 2012 14:26:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/podc/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1997,
  title     = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland,
               CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {1997},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4693},
  isbn      = {0-8186-7828-3},
  timestamp = {Thu, 08 Jan 2015 16:59:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stoc/1997,
  editor    = {Frank Thomson Leighton and
               Peter W. Shor},
  title     = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory
               of Computing, El Paso, Texas, USA, May 4-6, 1997},
  publisher = {{ACM}},
  year      = {1997},
  isbn      = {0-89791-888-6},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1996,
  editor    = {Li Gong and
               Jacques Stearn},
  title     = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
               Communications Security, New Delhi, India, March 14-16, 1996},
  publisher = {{ACM}},
  year      = {1996},
  url       = {http://dl.acm.org/citation.cfm?id=238168},
  isbn      = {0-89791-829-0},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/1996,
  title     = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
               1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  publisher = {{IEEE} Computer Society},
  year      = {1996},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=3781},
  isbn      = {0-8186-7522-5},
  timestamp = {Fri, 13 May 2016 11:53:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/96,
  editor    = {Ueli M. Maurer},
  title     = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
               on the Theory and Application of Cryptographic Techniques, Saragossa,
               Spain, May 12-16, 1996, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1070},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/3-540-68339-9},
  doi       = {10.1007/3-540-68339-9},
  isbn      = {3-540-61186-X},
  timestamp = {Mon, 22 May 2017 16:14:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/95,
  editor    = {Louis C. Guillou and
               Jean{-}Jacques Quisquater},
  title     = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
               on the Theory and Application of Cryptographic Techniques, Saint-Malo,
               France, May 21-25, 1995, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {921},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/3-540-49264-X},
  doi       = {10.1007/3-540-49264-X},
  isbn      = {3-540-59409-4},
  timestamp = {Mon, 22 May 2017 12:56:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1995,
  title     = {Proceedings of the 1995 {IEEE} Symposium on Security and Privacy,
               Oakland, California, USA, May 8-10, 1995},
  publisher = {{IEEE} Computer Society},
  year      = {1995},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=3181},
  isbn      = {0-8186-7015-0},
  timestamp = {Thu, 08 Jan 2015 16:59:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/1995},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1994,
  editor    = {Dorothy E. Denning and
               Raymond Pyle and
               Ravi Ganesan and
               Ravi S. Sandhu},
  title     = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and
               Communications Security, Fairfax, Virginia, USA, November 2-4, 1994},
  publisher = {{ACM}},
  year      = {1994},
  url       = {http://dl.acm.org/citation.cfm?id=191177},
  isbn      = {0-89791-732-4},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/1994},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/1994ds,
  editor    = {Kenneth P. Birman and
               Friedemann Mattern and
               Andr{\'{e}} Schiper},
  title     = {Theory and Practice in Distributed Systems, International Workshop,
               Dagstuhl Castle, Germany, September 5-9, 1994, Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {938},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/3-540-60042-6},
  doi       = {10.1007/3-540-60042-6},
  isbn      = {3-540-60042-6},
  timestamp = {Sat, 20 May 2017 15:32:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/1994ds},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1994,
  title     = {1994 {IEEE} Computer Society Symposium on Research in Security and
               Privacy, Oakland, CA, USA, May 16-18, 1994},
  publisher = {{IEEE} Computer Society},
  year      = {1994},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=968},
  isbn      = {0-8186-5675-1},
  timestamp = {Mon, 12 Jan 2015 17:20:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/1994},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1993,
  title     = {1993 {IEEE} Computer Society Symposium on Research in Security and
               Privacy, Oakland, CA, USA, May 24-26, 1993},
  publisher = {{IEEE} Computer Society},
  year      = {1993},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=902},
  isbn      = {0-8186-3370-0},
  timestamp = {Mon, 12 Jan 2015 17:20:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/1993},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1992,
  title     = {1992 {IEEE} Computer Society Symposium on Research in Security and
               Privacy, Oakland, CA, USA, May 4-6, 1992},
  publisher = {{IEEE} Computer Society},
  year      = {1992},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=412},
  isbn      = {0-8186-2825-1},
  timestamp = {Mon, 12 Jan 2015 17:19:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/1992},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier