The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CCSW"( http://dblp.L3S.de/Venues/CCSW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ccs

Publication years (Num. hits)
2009 (15) 2010 (15) 2011 (17) 2012 (17) 2013-2014 (29) 2015-2016 (22) 2017-2019 (27) 2020 (18) 2021-2022 (24)
Publication types (Num. hits)
inproceedings(171) proceedings(13)
Venues (Conferences, Journals, ...)
CCSW(184)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 184 publication records. Showing 184 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Thomas Lorünser, Florian Wohner, Stephan Krenn A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic Management. Search on Bibsonomy CCSW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Rosario Cammarota Intel HERACLES: Homomorphic Encryption Revolutionary Accelerator with Correctness for Learning-oriented End-to-End Solutions. Search on Bibsonomy CCSW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Aydin Aysu Multi-Tenant Cloud FPGAs: Side-Channel Security and Safety. Search on Bibsonomy CCSW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Thijs van Ede, Niek Khasuntsev, Bas Steen, Andrea Continella Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies. Search on Bibsonomy CCSW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Asbat El Khairi, Marco Caselli, Christian Knierim, Andreas Peter, Andrea Continella Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection. Search on Bibsonomy CCSW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Haibin Zhang Byzantine Fault Tolerance in the Age of Blockchains and Cloud Computing. Search on Bibsonomy CCSW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Roberto Avanzi Cryptographic Protection of Random Access Memory: How Inconspicuous can Hardening Against the most Powerful Adversaries be? Search on Bibsonomy CCSW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Panagiotis Rizomiliotis, Aikaterini Triakosia On Matrix Multiplication with Homomorphic Encryption. Search on Bibsonomy CCSW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Francesco Regazzoni 0001, Marten van Dijk (eds.) Proceedings of the 2022 on Cloud Computing Security Workshop, CCSW 2022, Los Angeles, CA, USA, 7 November 2022 Search on Bibsonomy CCSW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sana Habib, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore. Search on Bibsonomy CCSW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Osman Biçer, Burcu Yildiz, Alptekin Küpçü m-Stability: Threshold Security Meets Transferable Utility. Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Claudio Canella, Mario Werner, Daniel Gruss, Michael Schwarz 0001 Automating Seccomp Filter Generation for Linux Applications. Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Srdjan Capkun, Ercan Ozturk, Gene Tsudik, Karl Wüst ROSEN: RObust and SElective Non-repudiation (for TLS). Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Xiaoqi Duan, Vipul Goyal, Hanjun Li 0001, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song ACCO: Algebraic Computation with Comparison. Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Joana Pecholt, Monika Huber 0001, Sascha Wessel Live Migration of Operating System Containers in Encrypted Virtual Machines. Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Xianrui Meng, Dimitrios Papadopoulos 0001, Alina Oprea, Nikos Triandopoulos Private Hierarchical Clustering and Efficient Approximation. Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Pedro Antonino, Wojciech Aleksander Woloszyn, A. W. Roscoe 0001 Guardian: Symbolic Validation of Orderliness in SGX Enclaves. Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Christian Banse Data Sovereignty in the Cloud - Wishful Thinking or Reality? Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mahnush Movahedi, Benjamin M. Case, James Honaker, Andrew Knox, Li Li, Yiming Paul Li, Sanjay Saravanan, Shubho Sengupta, Erik Taubeneck Privacy-Preserving Randomized Controlled Trials: A Protocol for Industry Scale Deployment. Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Guofei Gu Programmable Security in the Age of Software-Defined Infrastructure. Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yinqian Zhang, Marten van Dijk (eds.) CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, Virtual Event, Republic of Korea, 15 November 2021 Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Akash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta 0001, Arun Gururajan, Huan Yu Secure Featurization and Applications to Secure Phishing Detection. Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Orran Krieger Security in a Cloud Bazaar. Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sepideh Avizheh, Preston Haffey, Reihaneh Safavi-Naini Privacy-enhanced OptiSwap. Search on Bibsonomy CCSW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Luis Vargas, Patrick Emami, Patrick Traynor On the Detection of Disinformation Campaign Activity with Network Analysis. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1William Findlay, Anil Somayaji, David Barrera 0003 bpfbox: Simple Precise Process Confinement with eBPF. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lukas Alber, Stefan More, Sebastian Ramacher Short-Lived Forward-Secure Delegation for TLS. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Charlotte Bonte, Ilia Iliashenko Homomorphic String Search with Constant Multiplicative Depth. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yuntao Liu 0001, Ankur Srivastava 0001 GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ralf Ramsauer, Lukas Bulwahn, Daniel Lohmann, Wolfgang Mauerer The Sound of Silence: Mining Security Vulnerabilities from Secret Integration Channels in Open-Source Projects. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sushrut Shringarputale, Patrick D. McDaniel, Kevin R. B. Butler, Thomas La Porta Co-residency Attacks on Containers are Real. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Wei Yuan Non-Interactive Cryptographic Access Control for Secure Outsourced Storage. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yujun Qin, Samuel Gonzalez, Kevin Angstadt, Xiaowei Wang, Stephanie Forrest, Reetuparna Das, Kevin Leach, Westley Weimer MARTINI: Memory Access Traces to Detect Attacks. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Naufal Suryanto, Hyoeun Kang, Yongsu Kim, Youngyeo Yun, Harashta Tatimma Larasati, Howon Kim 0001 ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yinqian Zhang, Radu Sion (eds.) CCSW'20, Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, Virtual Event, USA, November 9, 2020 Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ranya Aloufi, Hamed Haddadi, David Boyle 0001 Privacy-preserving Voice Analysis via Disentangled Representations. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nadim Kobeissi, Georgio Nicolas, Mukesh Tiwari Verifpal: Cryptographic Protocol Analysis for the Real World. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chaoyun Zhang, Xavier Costa-Pérez, Paul Patras Tiki-Taka: Attacking and Defending Deep Learning-based Intrusion Detection Systems. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Martin Johns, Alexandra Dirksen Towards Enabling Secure Web-Based Cloud Services using Client-Side Encryption. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Bogdan Pavel Deac, Adrian Colesa Following the Pebble Trail: Extending Return-Oriented Programming to RISC-V. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Benjamin Zi Hao Zhao, Mohamed Ali Kâafar, Nicolas Kourtellis Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Brian A. Coan, Lisa Bahler, Kurt Rohloff, Yuriy Polyakov, David Bruce Cousins Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation. Search on Bibsonomy CCSW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tobias F. Pfeffer, Sabine Glesner Timing-Sensitive Synchronization for Efficient Secure Multi-Execution. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yinqian Zhang, Radu Sion Speculative Execution Attacks and Cloud Security. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Indranil Jana, Alina Oprea AppMine: Behavioral Analytics for Web Application Vulnerability Detection. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kalikinkar Mandal, Guang Gong PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mireya Jurado, Geoffrey Smith 0001 Quantifying Information Leakage of Deterministic Encryption. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dou Goodman, Xin Hao, Yang Wang, Jiawei Tang, Yunhan Jia, Pei Wang, Tao Wei ABSTRACT: Cloud-based Image Classification Service is Not Robust to Affine Transformation: A Forgotten Battlefield. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Michael P. Heinl, Alexander Giehl, Norbert Wiedermann, Sven Plaga, Frank Kargl MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Saeed Valizadeh, Marten van Dijk MalPro: A Learning-based Malware Propagation and Containment Modeling. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Radu Sion, Charalampos Papamanthou (eds.) Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  BibTeX  RDF
1Sepideh Avizheh, Mahmudun Nabi, Reihaneh Safavi-Naini, Muni Venkateswarlu K. Verifiable Computation using Smart Contracts. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Susanne Felsen, Ágnes Kiss, Thomas Schneider 0003, Christian Weinert Secure and Private Function Evaluation with Intel SGX. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko ABSTRACT: Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nigel P. Smart, Titouan Tanguy TaaS: Commodity MPC via Triples-as-a-Service. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal, Mike Rosulek Secure Data Exchange: A Marketplace in the Cloud. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Panagiotis Rizomiliotis, Stefanos Gritzalis Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fritz Alder, N. Asokan, Arseny Kurnikov, Andrew Paverd, Michael Steiner 0001 S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1En Zhang, Feng-Hao Liu, Qiqi Lai, Ganggang Jin, Yu Li Efficient Multi-Party Private Set Intersection Against Malicious Adversaries. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Robi Pedersen, Osmanbey Uzunkol Secure Delegation of Isogeny Computations and Cryptographic Applications. Search on Bibsonomy CCSW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Panagiotis Rizomiliotis, Eirini Molla, Stefanos Gritzalis REX: A Searchable Symmetric Encryption Scheme Supporting Range Queries. Search on Bibsonomy CCSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, Simon Duquennoy Towards Blockchain-based Auditable Storage and Sharing of IoT Data. Search on Bibsonomy CCSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server. Search on Bibsonomy CCSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bhavani Thuraisingham, Ghassan Karame, Angelos Stavrou (eds.) Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS 2017, Dallas, TX, USA, November 3, 2017 Search on Bibsonomy CCSW The full citation details ... 2017 DBLP  BibTeX  RDF
1Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid 0001 The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser. Search on Bibsonomy CCSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuquan Shan, George Kesidis, Daniel Fleck Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems. Search on Bibsonomy CCSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Leo Alcock, Ling Ren 0001 A Note on the Security of Equihash. Search on Bibsonomy CCSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi 0002, Catherine Jones Privacy-preserving Machine Learning in Cloud. Search on Bibsonomy CCSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Benny Fuhry, Walter Tighzert, Florian Kerschbaum Encrypting Analytical Web Applications. Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mouhebeddine Berrima, Aïcha Katajina Nasr, Narjes Ben Rajeb Co-location Resistant Strategy with Full Resources Optimization. Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohamed Ahmed Abdelraheem, Christian Gehrmann, Malin Lindström, Christian Nordahl Executing Boolean Queries on an Encrypted Bitmap Index. Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kopo M. Ramokapane, Awais Rashid, Jose M. Such Assured Deletion in the Cloud: Requirements, Challenges and Future Directions. Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohammad Etemad, Alptekin Küpçü Generic Efficient Dynamic Proofs of Retrievability. Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dimitrios Vasilopoulos, Melek Önen, Kaoutar Elkhiyaoui, Refik Molva Message-Locked Proofs of Retrievability with Secure Deduplication. Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hubert Ritzdorf, Ghassan Karame, Claudio Soriente, Srdjan Capkun On Information Leakage in Deduplicated Storage Systems. Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Edgar R. Weippl, Stefan Katzenbeisser 0001, Mathias Payer, Stefan Mangard, Elli Androulaki, Michael K. Reiter (eds.) Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW 2016, Vienna, Austria, October 28, 2016 Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Luciano Franceschina Data Analytics: Understanding Human Behavior based on Mobile Network Data. Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Meryeme Ayache, Mohammed Erradi, Bernd Freisleben, Ahmed Khoumsi Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments. Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Florian Hahn 0001, Florian Kerschbaum Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage. Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Haya Schulmann, Michael Waidner Stratum Filtering: Cloud-based Detection of Attack Sources. Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marc Sánchez Artigas Oblivious RAM as a Substrate for Cloud Storage - The Leakage Challenge Ahead. Search on Bibsonomy CCSW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rashmi Kumari, Mohsen Alimomeni, Reihaneh Safavi-Naini Performance Analysis of Linux RNG in Virtualized Environments. Search on Bibsonomy CCSW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dennis Felsch, Mario Heiderich, Frederic Schulz, Jörg Schwenk How Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces. Search on Bibsonomy CCSW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Frank Li 0001, Richard Shin, Vern Paxson Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Search on Bibsonomy CCSW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yong Ho Hwang, Sungwook Kim, Jae Woo Seo Fast Order-Preserving Encryption from Uniform Distribution Sampling. Search on Bibsonomy CCSW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael K. Reiter Side Channels in Multi-Tenant Environments. Search on Bibsonomy CCSW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Indrajit Ray, Xiaofeng Wang, Kui Ren 0001, Florian Kerschbaum, Cristina Nita-Rotaru (eds.) Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW 2015, Denver, Colorado, USA, October 16, 2015 Search on Bibsonomy CCSW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Panagiotis Rizomiliotis, Stefanos Gritzalis ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes. Search on Bibsonomy CCSW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kenneth Block, Guevara Noubir Return of the Covert Channel, Data Center Style. Search on Bibsonomy CCSW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chenxi Wang Cloud Security: The Industry Landscape and the Lure of Zero-Knowledge Protection. Search on Bibsonomy CCSW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bryan D. Payne Reducing the Cost of Security in the Cloud. Search on Bibsonomy CCSW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, David M. Eyers, Brian Shand, Rüdiger Kapitza, Peter R. Pietzuch CloudSafetyNet: Detecting Data Leakage between Cloud Tenants. Search on Bibsonomy CCSW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Elaine Shi Emil Stefanov: Bridging the Theory and Practice of Cloud Computing Security. Search on Bibsonomy CCSW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David A. McGrew Privacy vs. Efficacy in Cloud-based Threat Detection. Search on Bibsonomy CCSW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi A Framework for Outsourcing of Secure Computation. Search on Bibsonomy CCSW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ferdinand Brasser, Mihai Bucicoiu, Ahmad-Reza Sadeghi Swap and Play: Live Updating Hypervisors and Its Application to Xen. Search on Bibsonomy CCSW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thomas Groß 0001 Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs. Search on Bibsonomy CCSW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuqiong Sun, Giuseppe Petracca, Trent Jaeger Inevitable Failure: The Flawed Trust Assumption in the Cloud. Search on Bibsonomy CCSW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Joanne Martin, Koos Lodewijkx Securing Cloud Environments for Enterprise Computing. Search on Bibsonomy CCSW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 184 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license