|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1084 occurrences of 605 keywords
|
|
|
Results
Found 3214 publication records. Showing 3214 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Marcel Böhme, Van-Thuan Pham, Abhik Roychoudhury |
Coverage-based Greybox Fuzzing as Markov Chain. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zhan Qin, Yin Yang 0001, Ting Yu 0001, Issa Khalil, Xiaokui Xiao, Kui Ren 0001 |
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ranjit Kumaresan, Iddo Bentov |
Amortizing Secure Computation with Penalties. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Frank Cangialosi, Taejoong Chung, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson |
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | István Haller, Yuseok Jeon, Hui Peng, Mathias Payer, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe |
TypeSan: Practical Type Confusion Detection. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Peter Mayer 0001, Stephan Neumann, Melanie Volkamer |
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Edgar R. Weippl, Stefan Katzenbeisser 0001, Christopher Kruegel, Andrew C. Myers, Shai Halevi (eds.) |
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 |
CCS |
2016 |
DBLP BibTeX RDF |
|
1 | Changhee Hahn, Junbeom Hur |
POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Felix Dörre, Vladimir Klebanov |
Practical Detection of Entropy Loss in Pseudo-Random Number Generators. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu |
Efficient Batched Oblivious PRF with Applications to Private Set Intersection. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hadi Zolfaghari, Amir Houmansadr |
Practical Censorship Evasion Leveraging Content Delivery Networks. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jianjun Chen 0005, Jian Jiang, Hai-Xin Duan, Nicholas Weaver, Tao Wan 0004, Vern Paxson |
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun |
On the Security and Performance of Proof of Work Blockchains. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Paul Grubbs, Richard McPherson, Muhammad Naveed 0001, Thomas Ristenpart, Vitaly Shmatikov |
Breaking Web Applications Built On Top of Encrypted Data. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aggelos Kiayias, Thomas Zacharias 0001, Bingsheng Zhang |
DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, S. Raj Rajagopalan |
Surpass: System-initiated User-replaceable Passwords. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Franck Youssef |
Transparent Data Deduplication in the Cloud. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qi Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru Shao, Zhuoqing Morley Mao |
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Florian Tramèr, Zhicong Huang, Jean-Pierre Hubaux, Erman Ayday |
Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Bonfante, José M. Fernandez 0001, Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, Aurélien Thierry |
CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ian D. Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko |
Security by Any Other Name: On the Effectiveness of Provider Based Email Security. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alex Beutel, Leman Akoglu, Christos Faloutsos |
Fraud Detection through Graph-Based User Behavior Modeling. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Deguang Kong, Lei Cen, Hongxia Jin |
AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tomas Sander, Moti Yung |
WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun |
Tampering with the Delivery of Blocks and Transactions in Bitcoin. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ben Stock, Stephan Pfistner, Bernd Kaiser, Sebastian Lekies, Martin Johns |
From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Edward W. Felten |
Keynote Talk. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nicholas Hopper, Rob Jansen |
WPES 2015: The 14th Workshop on Privacy in the Electronic Society. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Matt Fredrikson, Somesh Jha, Thomas Ristenpart |
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan |
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Manish Shukla 0001, Sumesh Manjunath, Rohit Saxena, Sutapa Mondal, Sachin Lodha |
POSTER: WinOver Enterprise Dark Data. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Iasonas Polakis, George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis |
Where's Wally?: Precise User Discovery Attacks in Location Proximity Services. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiaocong Jin, Jingchao Sun, Rui Zhang 0007, Yanchao Zhang |
SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | John Sonchack, Adam J. Aviv, Eric Keller, Jonathan M. Smith |
POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mingyi Zhao, Jens Grossklags, Peng Liu 0005 |
An Empirical Study of Web Vulnerability Discovery Ecosystems. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Khilan Gudka, Robert N. M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson |
Clean Application Compartmentalization with SOAAP. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aggelos Kiayias, Qiang Tang 0005 |
Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vireshwar Kumar, He Li 0007, Jung-Min "Jerry" Park, Kaigui Bian, Yaling Yang |
Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Straub |
POSTER: Blackboard-Based Electronic Warfare System. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yupeng Zhang 0001, Jonathan Katz, Charalampos Papamanthou |
IntegriDB: Verifiable SQL for Outsourced Databases. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aldo Cassola, Erik-Oliver Blass, Guevara Noubir |
Authenticating Privately over Public Wi-Fi Hotspots. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford |
POSTER: Using Unit Testing to Detect Sanitization Flaws. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nethanel Gelernter, Amir Herzberg |
Cross-Site Search Attacks. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Omar Chowdhury, Deepak Garg 0001, Limin Jia 0001, Anupam Datta |
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Chudnov, David A. Naumann |
Inlined Information Flow Monitoring for JavaScript. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jonghyuk Song, Sangho Lee 0001, Jong Kim 0001 |
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ilsun You, Elisa Bertino |
MIST 2015: 7th International Workshop on Managing Insider Security Threats. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee |
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chia-Mu Yu |
POSTER: Lightweight Streaming Authenticated Data Structures. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anoop Singhal, Changwei Liu, Duminda Wijesekera |
POSTER: A Logic Based Network Forensics Model for Evidence Analysis. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios |
GRECS: Graph Encryption for Approximate Shortest Distance Queries. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Glenn Wurster, David Lie |
SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Babak Yadegari, Saumya Debray |
Symbolic Execution of Obfuscated Code. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Peixin Chen, Xiaofeng Wang 0002, Yilun Wu, Jinshu Su, Huan Zhou 0006 |
POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Anja Lehmann |
(Un)linkable Pseudonyms for Governmental Databases. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Srdjan Matic, Platon Kotzias, Juan Caballero |
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, Yuanyuan Zhang 0002, Dawu Gu |
From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Yu Li 0001, Guan-Hua Tu, Chunyi Peng 0001, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang |
Insecurity of Voice Solution VoLTE in LTE Mobile Networks. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fengjun Li, Xin Fu, Bo Luo |
POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shay Gueron, Yehuda Lindell |
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Luke Rodriguez, Darren S. Curtis, Sutanay Choudhury, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray |
DEMO: Action Recommendation for Cyber Resilience. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis |
Face/Off: Preventing Privacy Leakage From Photos in Social Networks. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman |
SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff |
Automated Analysis and Synthesis of Authenticated Encryption Schemes. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang 0001, Dongyan Xu |
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tao Wang 0026, Yao Liu 0007, Qingqi Pei, Tao Hou |
Location-restricted Services Access Control Leveraging Pinpoint Waveforming. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Manh Huynh, Phuc Nguyen 0002, Marco Gruteser, Tam Vu 0001 |
POSTER: Mobile Device Identification by Leveraging Built-in Capacitive Signature. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yasser Shoukry, Paul Martin 0008, Yair Yona, Suhas N. Diggavi, Mani B. Srivastava |
PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Marco Negro, Christopher Liebchen, Mohaned Qunaibit, Ahmad-Reza Sadeghi |
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Dowling, Marc Fischlin, Felix Günther 0001, Douglas Stebila |
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo |
Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis |
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Bogdanov, Takanori Isobe 0001 |
White-Box Cryptography Revisited: Space-Hard Ciphers. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Neasbitt, Bo Li 0058, Roberto Perdisci, Long Lu, Kapil Singh, Kang Li 0001 |
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiangyu Liu, Zhe Zhou 0001, Wenrui Diao, Zhou Li 0001, Kehuan Zhang |
When Good Becomes Evil: Keystroke Inference with Smartwatch. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yousra Aafer, Nan Zhang 0018, Zhongwen Zhang, Xiao Zhang, Kai Chen 0012, XiaoFeng Wang 0001, Xiao-yong Zhou, Wenliang Du, Michael Grace |
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tim Ruffing, Aniket Kate, Dominique Schröder |
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Divya Muthukumaran, Dan O'Keeffe, Christian Priebe, David M. Eyers, Brian Shand, Peter R. Pietzuch |
FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray |
CCSW 2015: The 7th ACM Cloud Computing Security Workshop. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Pereira, François-Xavier Standaert, Srinivas Vivek 0001 |
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Naveed 0001, Seny Kamara, Charles V. Wright |
Inference Attacks on Property-Preserving Encrypted Databases. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Wang 0012, T.-H. Hubert Chan, Elaine Shi |
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Meijer, Roel Verdult |
Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Joseph A. Akinyele, Christina Garman, Susan Hohenberger |
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yan Li 0075, Yingjiu Li, Qiang Yan 0001, Hancong Kong, Robert H. Deng |
Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena, Leanne M. Hirshfield |
A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chen Chen 0013, Daniele Enrico Asoni, David Barrera 0003, George Danezis, Adrian Perrig |
HORNET: High-speed Onion Routing at the Network Layer. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Ming 0002, Dongpeng Xu 0001, Li Wang, Dinghao Wu |
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Henning Perl, Sergej Dechand, Matthew Smith 0001, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar |
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras |
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard E. Shrobe, Martin C. Rinard, Hamed Okhravi, Stelios Sidiroglou-Douskos |
Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | JungSeung Lee, HyoungMin Ham, InHwan Kim, JooSeok Song |
POSTER: Page Table Manipulation Attack. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Subhojeet Mukherjee, Sachini S. Weerawardhana, Chancey Dunn, Indrajit Ray, Adele E. Howe |
POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fabian van den Broek, Roel Verdult, Joeri de Ruiter |
Defeating IMSI Catchers. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart |
Leakage-Abuse Attacks Against Searchable Encryption. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos |
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable). |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yehuda Lindell, Ben Riva |
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha |
Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Peeter Laud, Jaak Randmets |
A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Reza Shokri, Vitaly Shmatikov |
Privacy-Preserving Deep Learning. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
|
|