The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CCS"( http://dblp.L3S.de/Venues/CCS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ccs

Publication years (Num. hits)
1993 (31) 1994 (32) 1996 (21) 1997 (18) 1998 (19) 1999 (17) 2000 (33) 2001 (28) 2002 (28) 2003 (37) 2004 (37) 2005 (43) 2006 (40) 2007 (57) 2008 (53) 2009 (59) 2010 (99) 2011 (103) 2012 (113) 2013 (159) 2014 (203) 2015 (170) 2016 (197) 2017 (207) 2018 (200) 2019 (208) 2020 (194) 2021 (227) 2022 (288) 2023 (293)
Publication types (Num. hits)
inproceedings(3180) proceedings(34)
Venues (Conferences, Journals, ...)
CCS(3214)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1084 occurrences of 605 keywords

Results
Found 3214 publication records. Showing 3214 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Marcel Böhme, Van-Thuan Pham, Abhik Roychoudhury Coverage-based Greybox Fuzzing as Markov Chain. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhan Qin, Yin Yang 0001, Ting Yu 0001, Issa Khalil, Xiaokui Xiao, Kui Ren 0001 Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ranjit Kumaresan, Iddo Bentov Amortizing Secure Computation with Penalties. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Frank Cangialosi, Taejoong Chung, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1István Haller, Yuseok Jeon, Hui Peng, Mathias Payer, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe TypeSan: Practical Type Confusion Detection. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peter Mayer 0001, Stephan Neumann, Melanie Volkamer POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Edgar R. Weippl, Stefan Katzenbeisser 0001, Christopher Kruegel, Andrew C. Myers, Shai Halevi (eds.) Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 Search on Bibsonomy CCS The full citation details ... 2016 DBLP  BibTeX  RDF
1Changhee Hahn, Junbeom Hur POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Felix Dörre, Vladimir Klebanov Practical Detection of Entropy Loss in Pseudo-Random Number Generators. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu Efficient Batched Oblivious PRF with Applications to Private Set Intersection. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hadi Zolfaghari, Amir Houmansadr Practical Censorship Evasion Leveraging Content Delivery Networks. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jianjun Chen 0005, Jian Jiang, Hai-Xin Duan, Nicholas Weaver, Tao Wan 0004, Vern Paxson Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun On the Security and Performance of Proof of Work Blockchains. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Paul Grubbs, Richard McPherson, Muhammad Naveed 0001, Thomas Ristenpart, Vitaly Shmatikov Breaking Web Applications Built On Top of Encrypted Data. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aggelos Kiayias, Thomas Zacharias 0001, Bingsheng Zhang DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, S. Raj Rajagopalan Surpass: System-initiated User-replaceable Passwords. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Franck Youssef Transparent Data Deduplication in the Cloud. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qi Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru Shao, Zhuoqing Morley Mao Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Florian Tramèr, Zhicong Huang, Jean-Pierre Hubaux, Erman Ayday Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Guillaume Bonfante, José M. Fernandez 0001, Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, Aurélien Thierry CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ian D. Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko Security by Any Other Name: On the Effectiveness of Provider Based Email Security. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alex Beutel, Leman Akoglu, Christos Faloutsos Fraud Detection through Graph-Based User Behavior Modeling. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Deguang Kong, Lei Cen, Hongxia Jin AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tomas Sander, Moti Yung WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun Tampering with the Delivery of Blocks and Transactions in Bitcoin. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ben Stock, Stephan Pfistner, Bernd Kaiser, Sebastian Lekies, Martin Johns From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Edward W. Felten Keynote Talk. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nicholas Hopper, Rob Jansen WPES 2015: The 14th Workshop on Privacy in the Electronic Society. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Matt Fredrikson, Somesh Jha, Thomas Ristenpart Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Manish Shukla 0001, Sumesh Manjunath, Rohit Saxena, Sutapa Mondal, Sachin Lodha POSTER: WinOver Enterprise Dark Data. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Iasonas Polakis, George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis Where's Wally?: Precise User Discovery Attacks in Location Proximity Services. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaocong Jin, Jingchao Sun, Rui Zhang 0007, Yanchao Zhang SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1John Sonchack, Adam J. Aviv, Eric Keller, Jonathan M. Smith POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mingyi Zhao, Jens Grossklags, Peng Liu 0005 An Empirical Study of Web Vulnerability Discovery Ecosystems. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Khilan Gudka, Robert N. M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson Clean Application Compartmentalization with SOAAP. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aggelos Kiayias, Qiang Tang 0005 Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vireshwar Kumar, He Li 0007, Jung-Min "Jerry" Park, Kaigui Bian, Yaling Yang Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jeremy Straub POSTER: Blackboard-Based Electronic Warfare System. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yupeng Zhang 0001, Jonathan Katz, Charalampos Papamanthou IntegriDB: Verifiable SQL for Outsourced Databases. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aldo Cassola, Erik-Oliver Blass, Guevara Noubir Authenticating Privately over Public Wi-Fi Hotspots. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford POSTER: Using Unit Testing to Detect Sanitization Flaws. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nethanel Gelernter, Amir Herzberg Cross-Site Search Attacks. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Omar Chowdhury, Deepak Garg 0001, Limin Jia 0001, Anupam Datta Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrey Chudnov, David A. Naumann Inlined Information Flow Monitoring for JavaScript. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jonghyuk Song, Sangho Lee 0001, Jong Kim 0001 CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ilsun You, Elisa Bertino MIST 2015: 7th International Workshop on Managing Insider Security Threats. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chia-Mu Yu POSTER: Lightweight Streaming Authenticated Data Structures. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anoop Singhal, Changwei Liu, Duminda Wijesekera POSTER: A Logic Based Network Forensics Model for Evidence Analysis. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios GRECS: Graph Encryption for Approximate Shortest Distance Queries. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Glenn Wurster, David Lie SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Babak Yadegari, Saumya Debray Symbolic Execution of Obfuscated Code. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peixin Chen, Xiaofeng Wang 0002, Yilun Wu, Jinshu Su, Huan Zhou 0006 POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Anja Lehmann (Un)linkable Pseudonyms for Governmental Databases. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Srdjan Matic, Platon Kotzias, Juan Caballero CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, Yuanyuan Zhang 0002, Dawu Gu From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chi-Yu Li 0001, Guan-Hua Tu, Chunyi Peng 0001, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang Insecurity of Voice Solution VoLTE in LTE Mobile Networks. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fengjun Li, Xin Fu, Bo Luo POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shay Gueron, Yehuda Lindell GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Luke Rodriguez, Darren S. Curtis, Sutanay Choudhury, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray DEMO: Action Recommendation for Cyber Resilience. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis Face/Off: Preventing Privacy Leakage From Photos in Social Networks. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff Automated Analysis and Synthesis of Authenticated Encryption Schemes. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang 0001, Dongyan Xu VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tao Wang 0026, Yao Liu 0007, Qingqi Pei, Tao Hou Location-restricted Services Access Control Leveraging Pinpoint Waveforming. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Manh Huynh, Phuc Nguyen 0002, Marco Gruteser, Tam Vu 0001 POSTER: Mobile Device Identification by Leveraging Built-in Capacitive Signature. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yasser Shoukry, Paul Martin 0008, Yair Yona, Suhas N. Diggavi, Mani B. Srivastava PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Marco Negro, Christopher Liebchen, Mohaned Qunaibit, Ahmad-Reza Sadeghi Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Benjamin Dowling, Marc Fischlin, Felix Günther 0001, Douglas Stebila A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrey Bogdanov, Takanori Isobe 0001 White-Box Cryptography Revisited: Space-Hard Ciphers. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christopher Neasbitt, Bo Li 0058, Roberto Perdisci, Long Lu, Kapil Singh, Kang Li 0001 WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiangyu Liu, Zhe Zhou 0001, Wenrui Diao, Zhou Li 0001, Kehuan Zhang When Good Becomes Evil: Keystroke Inference with Smartwatch. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yousra Aafer, Nan Zhang 0018, Zhongwen Zhang, Xiao Zhang, Kai Chen 0012, XiaoFeng Wang 0001, Xiao-yong Zhou, Wenliang Du, Michael Grace Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tim Ruffing, Aniket Kate, Dominique Schröder Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Divya Muthukumaran, Dan O'Keeffe, Christian Priebe, David M. Eyers, Brian Shand, Peter R. Pietzuch FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray CCSW 2015: The 7th ACM Cloud Computing Security Workshop. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Olivier Pereira, François-Xavier Standaert, Srinivas Vivek 0001 Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Muhammad Naveed 0001, Seny Kamara, Charles V. Wright Inference Attacks on Property-Preserving Encrypted Databases. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiao Wang 0012, T.-H. Hubert Chan, Elaine Shi Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Carlo Meijer, Roel Verdult Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joseph A. Akinyele, Christina Garman, Susan Hohenberger Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yan Li 0075, Yingjiu Li, Qiang Yan 0001, Hancong Kong, Robert H. Deng Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena, Leanne M. Hirshfield A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chen Chen 0013, Daniele Enrico Asoni, David Barrera 0003, George Danezis, Adrian Perrig HORNET: High-speed Onion Routing at the Network Layer. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jiang Ming 0002, Dongpeng Xu 0001, Li Wang, Dinghao Wu LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Henning Perl, Sergej Dechand, Matthew Smith 0001, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard E. Shrobe, Martin C. Rinard, Hamed Okhravi, Stelios Sidiroglou-Douskos Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1JungSeung Lee, HyoungMin Ham, InHwan Kim, JooSeok Song POSTER: Page Table Manipulation Attack. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Subhojeet Mukherjee, Sachini S. Weerawardhana, Chancey Dunn, Indrajit Ray, Adele E. Howe POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fabian van den Broek, Roel Verdult, Joeri de Ruiter Defeating IMSI Catchers. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart Leakage-Abuse Attacks Against Searchable Encryption. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable). Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell, Ben Riva Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peeter Laud, Jaak Randmets A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Reza Shokri, Vitaly Shmatikov Privacy-Preserving Deep Learning. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1801 - #1900 of 3214 (100 per page; Change: )
Pages: [<<][9][10][11][12][13][14][15][16][17][18][19]
[20][21][22][23][24][25][26][27][28][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license