By Topic

[Title page i]

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.

The following topics are dealt with: authentication security; protection mechanisms; hardware security; knowledge systemization; browsing security; secure information flow; secure information policies; social networks; privacy; virtualization; trusted computing; program security analysis; underground economy; malware; vulnerability analysis; and anonymity.

Published in:

Security and Privacy (SP), 2011 IEEE Symposium on

Date of Conference:

22-25 May 2011