The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "AsiaCCS"( http://dblp.L3S.de/Venues/AsiaCCS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asiaccs

Publication years (Num. hits)
2006 (55) 2007 (48) 2008 (42) 2009 (43) 2010 (38) 2011 (62) 2012 (48) 2013 (62) 2014 (52) 2015 (73) 2016 (85) 2017 (88) 2018 (78) 2019 (72) 2020 (88) 2021 (74) 2022 (113) 2023 (89)
Publication types (Num. hits)
inproceedings(1192) proceedings(18)
Venues (Conferences, Journals, ...)
AsiaCCS(1210)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 554 occurrences of 379 keywords

Results
Found 1210 publication records. Showing 1210 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yan Li 0075, Ke Xu, Qiang Yan 0001, Yingjiu Li, Robert H. Deng Understanding OSN-based facial disclosure against face authentication systems. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jinsheng Zhang, Wensheng Zhang 0001, Daji Qiao S-ORAM: a segmentation-based oblivious RAM. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Collin Mulliner, William K. Robertson, Engin Kirda VirtualSwindle: an automated attack against in-app billing on android. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anupam Das 0001, Nikita Borisov, Prateek Mittal, Matthew Caesar 0001 Re3: relay reliability reputation for anonymity systems. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sebastian Mödersheim, Luca Viganò 0001 Sufficient conditions for vertical composition of security protocols. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jaroslav Sedenka, Paolo Gasti Privacy-preserving distance computation and proximity testing on earth, done right. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jelena Isacenkova, Davide Balzarotti Shades of gray: a closer look at emails in the gray area. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Markus Kammerstetter, Christian Platzer, Wolfgang Kastner Prospect: peripheral proxying supported embedded code testing. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guowu Xie, Huy Hang, Michalis Faloutsos Scanner hunter: understanding HTTP scanning traffic. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Timothy Vidas, Nicolas Christin Evading android runtime analysis via sandbox detection. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Georges Bossert, Frédéric Guihéry, Guillaume Hiet Towards automated protocol reverse engineering using semantic information. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Viet Hung Nguyen, Fabio Massacci The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wilko Henecka, Thomas Schneider 0003 Faster secure two-party computation with less memory. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bharath K. Samanthula, Hu Chun, Wei Jiang An efficient and probabilistic secure bit-decomposition. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Cong Zhang 0001, Tsz Hon Yuen, Hao Xiong 0002, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He Multi-key leakage-resilient threshold cryptography. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Payas Gupta, Swapna Gottipati, Jing Jiang 0001, Debin Gao Your love is public now: questioning the use of personal information in authentication. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Abedelaziz Mohaisen, Yongdae Kim Dynamix: anonymity on dynamic social structures. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mathy Vanhoef, Frank Piessens Practical verification of WPA-TKIP vulnerabilities. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, Dengguo Feng Bind your phone number with caution: automated user profiling through address book matching on smartphone. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kan Yang 0001, Xiaohua Jia, Kui Ren 0001 Attribute-based fine-grained access control with efficient revocation in cloud storage systems. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell An empirical study on the software integrity of virtual appliances: are you really getting what you paid for? Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Gugelmann, Dominik Schatzmann, Vincent Lenders Horizon extender: long-term preservation of data leakage evidence in web traffic. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vaibhav Rastogi, Yan Chen 0004, Xuxian Jiang DroidChameleon: evaluating Android anti-malware against transformation attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sebastian Schrittwieser, Stefan Katzenbeisser 0001, Peter Kieseberg, Markus Huber 0001, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl Covert computation: hiding code in code for obfuscation purposes. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nils Fleischhacker, Felix Günther 0001, Franziskus Kiefer, Mark Manulis, Bertram Poettering Pseudorandom signatures. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xuhua Ding, HweeHwa Pang, Junzuo Lai Verifiable and private top-k monitoring. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rong Hu, Kirill Morozov, Tsuyoshi Takagi Proof of plaintext knowledge for code-based public-key encryption revisited. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Qiang Tang 0001, Xiaofeng Chen 0001 Towards asymmetric searchable encryption with message recovery and flexible search authorization. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Roch Lescuyer Protecting privacy by sanitizing personal data: a new approach to anonymous credentials. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Cheng-Kang Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, Jianying Zhou 0001 Privacy-preserving smart metering with regional statistics and personal enquiry services. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jun Zhang 0010, Chao Chen 0015, Yang Xiang 0001, Wanlei Zhou 0001 Robust network traffic identification with unknown applications. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Huiping Yao, Dongwan Shin Towards preventing QR code based attacks on android phone using security warnings. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amirreza Masoumzadeh 0001, James Joshi Privacy settings in social networking systems: what you cannot control. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zhan Wang, Jiwu Jing, Liang Li 0003 Time evolving graphical password for securing mobile devices. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kazuma Ohara, Yusuke Sakai 0001, Keita Emura, Goichiro Hanaoka A group signature scheme with unbounded message-dependent opening. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aravind Prakash, Heng Yin 0001, Zhenkai Liang Enforcing system-wide control flow integrity for exploit detection and diagnosis. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang 0003, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig STRIDE: sanctuary trail - refuge from internet DDoS entrapment. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiaowei Li 0003, Yuan Xue 0001 LogicScope: automatic discovery of logic vulnerabilities within web applications. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hao Hao, Vicky Singh, Wenliang Du On the effectiveness of API-level access control using bytecode rewriting in Android. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ben Niu 0007, Gang Tan Efficient user-space information flow control. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Hugo Jonker, Pascal Lafourcade 0001 Defining verifiability in e-auction protocols. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shams Zawoad, Amit Kumar Dutta, Ragib Hasan SecLaaS: secure logging-as-a-service for cloud forensics. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kevin Atighehchi, Traian Muntean Towards fully incremental cryptographic schemes. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yihua Zhang, Marina Blanton Efficient dynamic provable possession of remote data via balanced update trees. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh Multi-channel broadcast encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum An information-flow type-system for mixed protocol secure computation. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marina Blanton, Aaron Steele, Mehrdad Aliasgari Data-oblivious graph algorithms for secure computation and outsourcing. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xinxin Zhao, Lingjun Li, Guoliang Xue Secure cloud-assisted location based reminder. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Wouter Joosen TabShots: client-side detection of tabnabbing attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chao Zhang 0008, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres Protecting function pointers in binary. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Qiang Yan 0001, Jin Han, Yingjiu Li, Jianying Zhou 0001, Robert H. Deng Designing leakage-resilient password entry on touchscreen mobile devices. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, Wen-Guey Tzeng (eds.) 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  BibTeX  RDF
1Wenbo Mao The role and effectiveness of cryptography in network virtualization: a position paper. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian Hanser, Daniel Slamanig Blank digital signatures. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim Trustworthy distributed computing on social networks. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Guanxing Wen, Yuqing Zhang 0001, Qixu Liu, Dingning Yang Fuzzing the ActionScript virtual machine. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wu Zhou 0001, Xinwen Zhang, Xuxian Jiang AppInk: watermarking android apps for repackaging deterrence. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami Comparative study of multicast authentication schemes with application to wide-area measurement system. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Junzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen Expressive search on encrypted data. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jia Xu 0006, Ee-Chien Chang, Jianying Zhou 0001 Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Junxian Huang, Yinglian Xie, Fang Yu 0002, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao SocialWatch: detection of online service abuse via large-scale social graphs. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz PSiOS: bring your own privacy & security to iOS devices. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yinghui Zhang 0002, Xiaofeng Chen 0001, Jin Li 0002, Duncan S. Wong, Hui Li 0006 Anonymous attribute-based encryption supporting efficient decryption test. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tarik Moataz, Abdullatif Shikfa Boolean symmetric searchable encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Seyed Hossein Ahmadinejad, Philip W. L. Fong On the feasibility of inference attacks by third-party extensions to social network systems. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie 0001, Yongdae Kim Protecting access privacy of cached contents in information centric networks. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wenhai Sun, Bing Wang 0005, Ning Cao 0001, Ming Li 0003, Wenjing Lou, Y. Thomas Hou 0001, Hui Li 0006 Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ragib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, Dustin Rinehart Sensing-enabled channels for hard-to-detect command and control of mobile devices. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie 0001 DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sebastian Clauß, Stefan Schiffner, Florian Kerschbaum k-anonymous reputation. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Davide Maiorca, Igino Corona, Giorgio Giacinto Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Heung Youl Youm, Yoojae Won (eds.) 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  BibTeX  RDF
1Viet Hung Nguyen, Fabio Massacci An independent validation of vulnerability discovery models. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, Frank Piessens FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David A. Wagner 0001 AdDroid: privilege separation for applications and advertisers in Android. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wahbeh H. Qardaji, Ninghui Li Recursive partitioning and summarization: a practical framework for differentially private data publishing. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Riccardo Pelizzi, R. Sekar 0001 Protection, usability and improvements in reflected XSS filters. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel A. Mayer, Susanne Wetzel Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jinwei Hu, Khaled M. Khan, Yun Bai 0001, Yan Zhang 0003 Constraint-enhanced role engineering via answer set programming. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Amit Vasudevan, Jonathan M. McCune, James Newsome, Adrian Perrig, Leendert van Doorn CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jiang Zhang 0001, Zhenfeng Zhang, Aijun Ge 0001 Ciphertext policy attribute-based encryption from lattices. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu An efficient broadcast attack against NTRU. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marina Blanton, Everaldo Aguiar Private and oblivious set and multiset operations. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cristiano Giuffrida, Stefano Ortolani, Bruno Crispo Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim On the mixing time of directed social graphs and security implications. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lingjun Li, Xinxin Zhao, Guoliang Xue An identity authentication protocol in online social networks. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lei Xu 0012, Xiaoxin Wu 0001, Xinwen Zhang CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen 0004, Xitao Wen Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Benjamin Davis, Hao Chen 0003, Matthew K. Franklin Privacy-preserving alibi systems. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joel Reardon, Claudio Marforio, Srdjan Capkun, David A. Basin User-level secure deletion on log-structured file systems. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto Practical client puzzles in the standard model. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nikos Mavrogiannopoulos, Andreas Pashalidis, Bart Preneel Security implications in Kerberos by the introduction of smart cards. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhiwei Li, Weichao Wang Towards the attacker's view of protocol narrations (or, how to compile security protocols). Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Khoongming Khoo, Chik How Tan New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shengzhi Zhang, Peng Liu 0005 Letting applications operate through attacks launched from compromised drivers. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sören Bleikertz, Anil Kurmus, Zoltán A. Nagy, Matthias Schunter Secure cloud maintenance: protecting workloads against insider attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 1210 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license