The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CCS"( http://dblp.L3S.de/Venues/CCS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ccs

Publication years (Num. hits)
1993 (31) 1994 (32) 1996 (21) 1997 (18) 1998 (19) 1999 (17) 2000 (33) 2001 (28) 2002 (28) 2003 (37) 2004 (37) 2005 (43) 2006 (40) 2007 (57) 2008 (53) 2009 (59) 2010 (99) 2011 (103) 2012 (113) 2013 (159) 2014 (203) 2015 (170) 2016 (197) 2017 (207) 2018 (200) 2019 (208) 2020 (194) 2021 (227) 2022 (288) 2023 (293)
Publication types (Num. hits)
inproceedings(3180) proceedings(34)
Venues (Conferences, Journals, ...)
CCS(3214)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1084 occurrences of 605 keywords

Results
Found 3214 publication records. Showing 3214 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Rahat Masood, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar POSTER: TouchTrack: How Unique are your Touch Gestures? Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1HyungSeok Han, Sang Kil Cha IMF: Inferred Model-based Fuzzer. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Adam J. Lee 16th Workshop on Privacy in the Electronic Society (WPES 2017). Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuseok Jeon, Priyam Biswas, Scott A. Carr, Byoungyoung Lee, Mathias Payer HexType: Efficient Detection of Type Confusion Errors for C++. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen 0012, XiaoFeng Wang 0001, Luyi Xing, Xiaolong Bai, Nan Zhang 0018, Xinhui Han Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmet Okutan, Gordon Werner, Katie McConky, Shanchieh Jay Yang POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE). Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yinqian Zhang Cache Side Channels: State of the Art and Research Opportunities. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam Ligero: Lightweight Sublinear Arguments Without a Trusted Setup. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Huasong Shan, Qingyang Wang 0001, Calton Pu Tail Attacks on Web Applications. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov Machine Learning Models that Remember Too Much. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Matús Nemec, Marek Sýs, Petr Svenda, Dusan Klinec, Vashek Matyas The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zixi Cai, Zigang Cao, Gang Xiong 0001, Zhen Li 0011, Wei Xia POSTER: An Empirical Measurement Study on Multi-tenant Deployment Issues of CDNs. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shijie Jia 0001, Luning Xia, Bo Chen, Peng Liu 0005 DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Briland Hitaj, Giuseppe Ateniese, Fernando Pérez-Cruz Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Li Chen, Mingwei Zhang 0005, Chih-Yuan Yang, Ravi Sahita POSTER: Semi-supervised Classification for Dynamic Android Malware Detection. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic Forte, Mark M. Tehranipoor Standardizing Bad Cryptographic Practice: A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Linghan Zhang, Sheng Tan, Jie Yang 0003 Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yushan Liu 0004, Shouling Ji, Prateek Mittal SmartWalk: Enhancing Social Network Security via Adaptive Random Walks. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Darius Suciu, Radu Sion POSTER: DroidShield: Protecting User Applications from Normal World Access. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fan Zhang 0022, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi Town Crier: An Authenticated Data Feed for Smart Contracts. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jack Doerner, David Evans 0001, Abhi Shelat Secure Stable Matching at Scale. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne Southall Winslett, Carl A. Gunter, William P. King Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, Prateek Saxena A Secure Sharding Protocol For Open Blockchains. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marshall Ball, Tal Malkin, Mike Rosulek Garbling Gadgets for Boolean and Arithmetic Circuits. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Steinke, Stefan Metzger, Wolfgang Hommel POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication Networks. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor An Empirical Study of Mnemonic Sentence-based Password Generation Strategies. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vassil S. Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson Alternative Implementations of Secure Real Numbers. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kevin Lewi, David J. Wu 0001 Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stephan Lau, Johannes Klick, Stephan Arndt, Volker Roth 0002 POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin Krämer, David Aspinall 0001, Maria Wolters POSTER: Weighing in eHealth Security. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, Nitesh Saxena The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Steven Englehardt, Arvind Narayanan Online Tracking: A 1-million-site Measurement and Analysis. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Brecht Wyseur, Bjorn De Sutter 2nd International Workshop on Software Protection: SPRO 2016. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Katarzyna Kapusta, Gérard Memmi, Hassan Noura 0001 POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Abeer Alhuzali, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan Chainsaw: Chained Automated Workflow-based Exploit Generation. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomas Rupprecht, Xi Chen 0038, David H. White 0001, Jan Tobias Mühlberg, Herbert Bos, Gerald Lüttgen POSTER: Identifying Dynamic Data Structures in Malware. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Panos Papadimitratos Security on Wheels: Security and Privacy for Vehicular Communication Systems. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang High Fidelity Data Reduction for Big Data Security Dependency Analyses. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Mandell Freeman, Katerina Mitrokotsa, Arunesh Sinha 9th International Workshop on Artificial Intelligence and Security: AISec 2016. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Manuel Fersch, Eike Kiltz, Bertram Poettering On the Provable Security of (EC)DSA Signatures. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, Nick Feamster PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Manish Shukla 0001, Sutapa Mondal, Sachin Lodha POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Raphael Bost ∑oφoς: Forward Secure Searchable Encryption. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kai Wang, Yuqing Zhang 0001, Peng Liu 0005 Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Juraj Somorovsky Systematic Fuzzing and Testing of TLS Libraries. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aljosha Judmayer, Edgar R. Weippl Condensed Cryptographic Currencies Crash Course (C5). Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic Using Reflexive Eye Movements for Fast Challenge-Response Authentication. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Md. Morshedul Islam, Reihaneh Safavi-Naini POSTER: A Behavioural Authentication System for Mobile Users. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Pouliot, Charles V. Wright The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lingling Fan 0003, Minhui Xue, Sen Chen 0001, Lihua Xu, Haojin Zhu POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tao Li 0042, Yimin Chen 0004, Jingchao Sun, Xiaocong Jin, Yanchao Zhang iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ari Juels, Ahmed E. Kosba, Elaine Shi The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ziyun Zhu, Tudor Dumitras FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Elli Androulaki, Michael K. Reiter CCSW'16: 8th ACM Cloud Computing Security Workshop. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Anrin Chakraborti, Chen Chen 0057, Radu Sion POSTER: DataLair: A Storage Block Device with Plausible Deniability. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Sven Bugiel, Erik Derr Reliable Third-Party Library Detection in Android and its Security Applications. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Viet Tung Hoang, Stefano Tessaro Message-Recovery Attacks on Feistel-Based Format Preserving Encryption. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ranjit Kumaresan, Vinod Vaikuntanathan, Prashant Nalini Vasudevan Improvements to Secure Computation with Penalties. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lianying Zhao, Mohammad Mannan Hypnoguard: Protecting Secrets across Sleep-wake Cycles. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mingshen Sun, Tao Wei, John C. S. Lui TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Isaac C. Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, Robbert van Renesse Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Guan-Hua Tu, Chi-Yu Li 0001, Chunyi Peng 0001, Yuanjie Li, Songwu Lu New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Cesar Pereida García, Billy Bob Brumley, Yuval Yarom "Make Sure DSA Signing Exponentiations Really are Constant-Time". Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Paul Cuff, Lanqing Yu Differential Privacy as a Mutual Information Constraint. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthew Green 0001, Watson Ladd, Ian Miers A Protocol for Privately Reporting Ad Impressions at Scale. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shuqin Fan, Wenbo Wang, Qingfeng Cheng Attacking OpenSSL Implementation of ECDSA with a Few Signatures. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill Generic Attacks on Secure Outsourced Databases. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eric Crockett 0001, Chris Peikert Λολ: Functional Lattice Cryptography. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rob Jansen, Aaron Johnson 0001 Safely Measuring Tor. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daiping Liu, Shuai Hao 0001, Haining Wang All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marcel Keller, Emmanuela Orsini, Peter Scholl MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nicholas J. Multari, Anoop Singhal, David O. Manz SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Talia Ringer, Dan Grossman, Franziska Roesner AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Steffen Wendzel, Wojciech Mazurczyk POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Merve Sahin, Aurélien Francillon Over-The-Top Bypass: Study of a Recent Telephony Fraud. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Milad Nasr, Amir Houmansadr GAME OF DECOYS: Optimal Decoy Routing Through Game Theory. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Pascal Berrang, Mathias Humbert, Praveen Manoharan 0001 Membership Privacy in MicroRNA-based Studies. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yilin Shen, Hongxia Jin EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson A Surfeit of SSH Cipher Suites. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin Attribute-based Key Exchange with General Policies. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik C-FLAT: Control-Flow Attestation for Embedded Systems Software. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Toshinori Araki, Assaf Barak, Jun Furukawa 0001, Yehuda Lindell, Ariel Nof, Kazuma Ohara DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dario Fiore 0001, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Asya Mitseva, Andriy Panchenko 0001, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel 0001 POSTER: Fingerprinting Tor Hidden Services. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Erman Ayday, Jean-Pierre Hubaux Privacy and Security in the Genomic Era. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Philipp Holzinger, Stefan Triller, Alexandre Bartel, Eric Bodden An In-Depth Study of More Than Ten Years of Java Exploitation. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaokui Shu, Danfeng Yao Program Anomaly Detection: Methodology and Practices. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chen Chen 0057, Darius Suciu, Radu Sion POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Roman Matzutt, Oliver Hohlfeld, Martin Henze, Robin Rawiel, Jan Henrik Ziegeldorf, Klaus Wehrle POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vincent F. Taylor, Ivan Martinovic DEMO: Starving Permission-Hungry Android Apps Using SecuRank. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Toshinori Araki, Jun Furukawa 0001, Yehuda Lindell, Ariel Nof, Kazuma Ohara High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kyong-Tak Cho, Kang G. Shin Error Handling of In-vehicle Networks Makes Them Vulnerable. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang A Software Approach to Defeating Side Channels in Last-Level Caches. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stefano Calzavara, Alvise Rabitti, Michele Bugliesi Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the Wild. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Long Lu, Mohammad Mannan Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016). Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Cecylia Bocovich, Ian Goldberg Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ercan Ucan, Raphael M. Reischuk, Adrian Perrig DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet? Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Linghan Zhang, Sheng Tan, Jie Yang 0003, Yingying Chen 0001 VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #1601 - #1700 of 3214 (100 per page; Change: )
Pages: [<<][7][8][9][10][11][12][13][14][15][16][17][18][19]
[20][21][22][23][24][25][26][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license