The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CCS"( http://dblp.L3S.de/Venues/CCS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ccs

Publication years (Num. hits)
1993 (31) 1994 (32) 1996 (21) 1997 (18) 1998 (19) 1999 (17) 2000 (33) 2001 (28) 2002 (28) 2003 (37) 2004 (37) 2005 (43) 2006 (40) 2007 (57) 2008 (53) 2009 (59) 2010 (99) 2011 (103) 2012 (113) 2013 (159) 2014 (203) 2015 (170) 2016 (197) 2017 (207) 2018 (200) 2019 (208) 2020 (194) 2021 (227) 2022 (288) 2023 (293)
Publication types (Num. hits)
inproceedings(3180) proceedings(34)
Venues (Conferences, Journals, ...)
CCS(3214)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1084 occurrences of 605 keywords

Results
Found 3214 publication records. Showing 3214 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yazhou Tu, Sara Rampazzi, Bin Hao, Angel Rodriguez, Kevin Fu, Xiali Hei 0001 Trick or Heat?: Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jianting Ning, Geong Sen Poh, Jia-Ch'ng Loh, Jason Chia, Ee-Chien Chang PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, Yinqian Zhang Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pengfei Qiu, Dongsheng Wang 0002, Yongqiang Lyu 0001, Gang Qu 0001 VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yu-Fu Fu, Jiaxiang Liu 0001, Xiaomu Shi, Ming-Hsien Tsai 0001, Bow-Yaw Wang, Bo-Yin Yang Signed Cryptographic Program Verification with Typed CryptoLine. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hafiz Salman Asif, Periklis A. Papakonstantinou, Jaideep Vaidya How to Accurately and Privately Identify Anomalies. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Moni Naor, Benny Pinkas, Eyal Ronen How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xing Gao 0001, Zhongshu Gu, Zhengfa Li, Hani Jamjoom, Cong Wang 0006 Houdini's Escape: Breaking the Resource Rein of Linux Control Groups. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens Updatable Anonymous Credentials and Applications to Incentive Systems. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Christof Ferreira Torres, Mathis Baden, Robert Norvill, Hugo Jonker ÆGIS: Smart Shielding of Smart Contracts. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jeremiah Blocki, Ling Ren 0001, Samson Zhou Bandwidth-Hard Functions: Reductions and Lower Bounds. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun 0001, Dongxi Liu, Cong Zuo Result Pattern Hiding Searchable Encryption for Conjunctive Queries. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Meisam Mohammady, Lingyu Wang 0001, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi Preserving Both Privacy and Utility in Network Trace Anonymization. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Toshinori Araki, Assi Barak, Jun Furukawa 0001, Marcel Keller, Kazuma Ohara, Hikaru Tsuchida How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Payman Mohassel, Peter Rindal ABY3: A Mixed Protocol Framework for Machine Learning. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates 0001, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer Runtime Analysis of Whole-System Provenance. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohsen Imani, Mohammad Saidur Rahman 0002, Matthew Wright 0001 Adversarial Traces for Website Fingerprinting Defense. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Quanyan Zhu, Stefan Rass Game Theory Meets Network Security: A Tutorial. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao 0001, Gail-Joon Ahn AIM-SDN: Attacking Information Mismanagement in SDN-datastores. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Katarzyna Kapusta, Gérard Memmi Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu Secure Opportunistic Multipath Key Exchange. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hojoon Lee 0001, Chihyun Song, Brent ByungHoon Kang Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini Tiresias: Predicting Security Events Through Deep Learning. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giorgi Maisuradze, Christian Rossow ret2spec: Speculative Execution Using Return Stack Buffers. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek TACHYON: Fast Signatures from Compact Knapsack. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa M. Redmiles, Blase Ur "What was that site doing with my Facebook password?": Designing Password-Reuse Notifications. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Stefan Savage Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi Fast Secure Computation for Small Population over the Internet. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rob Jansen, Matthew Traudt, Nicholas Hopper Privacy-Preserving Dynamic Learning of Tor Network Traffic. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chip-Hong Chang, Jorge Guajardo, Daniel E. Holcomb, Francesco Regazzoni 0001, Ulrich Rührmair ASHES 2018- Workshop on Attacks and Solutions in Hardware Security. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Edward J. Schwartz, Cory F. Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, Charles Hines Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Man Zhou, Qian Wang 0002, Jingxiao Yang, Qi Li 0002, Feng Xiao, Zhibo Wang 0001, Xiaofeng Chen 0001 PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xia Cheng, Mo Sha 0001 Cracking the TSCH Channel Hopping in IEEE 802.15.4e. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eric Crockett 0001, Chris Peikert, Chad Sharp ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Itay Tsabary, Ittay Eyal The Gap Game. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhikun Zhang 0001, Tianhao Wang 0001, Ninghui Li, Shibo He, Jiming Chen 0001 CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig Investigating System Operators' Perspective on Security Misconfigurations. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yousra Aafer, Guanhong Tao 0001, Jianjun Huang 0001, Xiangyu Zhang 0001, Ninghui Li Precise Android API Protection Mapping Derivation and Reasoning. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mauro Cherubini, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Iulia Bastys, Musard Balliu, Andrei Sabelfeld If This Then What?: Controlling Flows in IoT Apps. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammad A. Islam 0001, Shaolei Ren Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rachel Petrik, Berat Arik, Jared M. Smith Towards Architecture and OS-Independent Malware Detection via Memory Forensics. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Awais Rashid, Nils Ole Tippenhauer CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhiqiang Wang 0006, Pingchuan Ma 0004, Yaping Chi, Jianyi Zhang Medical Devices are at Risk: Information Security on Diagnostic Imaging System. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro Enabling Fair ML Evaluations for Security. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jiyeon Lee, Hayeon Kim, Junghwan Park, Insik Shin, Sooel Son Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Roei Schuster, Vitaly Shmatikov, Eran Tromer Situational Access Control in the Internet of Things. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal DiSE: Distributed Symmetric-key Encryption. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chris Chao-Chun Cheng, Chen Shi, Neil Zhenqiang Gong, Yong Guan EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kevin R. B. Butler, Robert K. Cunningham, Paul C. van Oorschot, Reihaneh Safavi-Naini, Ashraf Matrawy, Jeremy Clark A Discussion on Security Education in Academia. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhengxiong Li, Aditya Singh Rathore, Chen Song 0001, Sheng Wei 0001, Yanzhi Wang, Wenyao Xu PrinTracker: Fingerprinting 3D Printers using Commodity Scanners. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shuai Li, Huajun Guo, Nicholas Hopper Measuring Information Leakage in Website Fingerprinting Attacks and Defenses. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marcel Kneib, Christopher Huth Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hongxu Chen 0001, Yinxing Xue, Yuekang Li, Bihuan Chen 0001, Xiaofei Xie, Xiuheng Wu, Yang Liu 0003 Hawkeye: Towards a Desired Directed Grey-box Fuzzer. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yun Lu 0001, Konstantinos Mitropoulos, Rafail Ostrovsky, Avraham Weinstock, Vassilis Zikas Cryptographically Secure Detection of Injection Attacks. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mahdi Zamani, Mahnush Movahedi, Mariana Raykova 0001 RapidChain: Scaling Blockchain via Full Sharding. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mathy Vanhoef, Frank Piessens Release the Kraken: New KRACKs in the 802.11 Standard. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hao Chen 0030, Zhicong Huang, Kim Laine, Peter Rindal Labeled PSI from Fully Homomorphic Encryption with Malicious Security. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Massimo Bartoletti, Roberto Zunino BitML: A Calculus for Bitcoin Smart Contracts. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hong Hu 0004, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee Enforcing Unique Code Target Property for Control-Flow Integrity. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shashank Agrawal, Peihan Miao 0001, Payman Mohassel, Pratyay Mukherjee PASTA: PASsword-based Threshold Authentication. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dan Meng SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Toshinori Araki, Assi Barak, Jun Furukawa 0001, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida Generalizing the SPDZ Compiler For Other Protocols. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tibor Jager, Saqib A. Kakvi, Alexander May 0001 On the Security of the PKCS#1 v1.5 Signature Scheme. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Milad Nasr, Alireza Bahramali, Amir Houmansadr DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dongpeng Xu 0001, Jiang Ming 0002, Yu Fu, Dinghao Wu VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin R. B. Butler, Thomas Shrimpton, Doug Szajda, Patrick Traynor Mitigating Risk while Complying with Data Retention Laws. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Elissa M. Redmiles, John P. Dickerson, Krishna P. Gummadi, Michelle L. Mazurek Equitable Security: Optimizing Distribution of Nudges and Resources. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Song, Heng Yin 0001, Chang Liu 0021, Dawn Song DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Junghwan Yoon, Yezee Seo, Jaedong Jang, Mingi Cho, JinGoog Kim, HyeonSook Kim, Taekyoung Kwon 0002 A Bitstream Reverse Engineering Tool for FPGA Hardware Trojan Detection. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Binlin Cheng, Jiang Ming 0002, Jianming Fu, Guojun Peng, Ting Chen 0002, Xiaosong Zhang 0001, Jean-Yves Marion Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zeyu Ding 0001, Yuxin Wang, Guanhong Wang, Danfeng Zhang, Daniel Kifer Detecting Violations of Differential Privacy. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gili Rusak, Abdullah Al-Dujaili, Una-May O'Reilly AST-Based Deep Learning for Detecting Malicious PowerShell. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shifeng Sun 0001, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, Surya Nepal Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, Martin T. Vechev Securify: Practical Security Analysis of Smart Contracts. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal MVG Mechanism: Differential Privacy under Matrix-Valued Query. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sagar Sharma, Keke Chen Image Disguising for Privacy-preserving Deep Learning. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Amrita Roy Chowdhury 0001, Parameswaran Ramanathan Public Order Preserving Cipher Generation Scheme for Distributed Computing. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniela Napoli, Sonia Chiasson Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen Readers. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sisi Duan, Michael K. Reiter, Haibin Zhang BEAT: Asynchronous BFT Made Practical. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Young-joo Shin, Hyung Chan Kim, Dokeun Kwon, Ji-Hoon Jeong, Junbeom Hur Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Helen Nissenbaum Achieving Meaningful Privacy in Digital Systems. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David M. Sommer 0001, Sebastian Meiser 0001, Esfandiar Mohammadi PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mário S. Alvim, Stéphanie Delaune PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Security. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Karan Ganju, Qi Wang 0017, Wei Yang 0013, Carl A. Gunter, Nikita Borisov Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Zhang, Yan Meng 0001, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shai Halevi Advanced Cryptography: Promise and Challenges. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mehmet Emre Gursoy, Ling Liu 0001, Stacey Truex, Lei Yu 0002, Wenqi Wei Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Quan Chen, Alexandros Kapravelos Mystique: Uncovering Information Leakage from Browser Extensions. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Simone Aonzo, Alessio Merlo, Giulio Tavella, Yanick Fratantonio Phishing Attacks on Modern Android. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lei Zhang 0096, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian, Geng Hong, Yuan Zhang 0009, Min Yang 0002 Invetter: Locating Insecure Input Validations in Android Services. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh Rendered Insecure: GPU Side Channel Attacks are Practical. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Seung Ho Na, Kwanwoo Kim, Seungwon Shin Knowledge Seeking on The Shadow Brokers. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nestor Hernandez, Mizanur Rahman, Ruben Recabarren, Bogdan Carbunar Fraud De-Anonymization for Fun and Profit. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anupam Das 0001, Gunes Acar, Nikita Borisov, Amogh Pradeep The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1201 - #1300 of 3214 (100 per page; Change: )
Pages: [<<][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]
[20][21][22][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license