Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Yan Li 0075, Ke Xu, Qiang Yan 0001, Yingjiu Li, Robert H. Deng |
Understanding OSN-based facial disclosure against face authentication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 413-424, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jinsheng Zhang, Wensheng Zhang 0001, Daji Qiao |
S-ORAM: a segmentation-based oblivious RAM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 147-158, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Collin Mulliner, William K. Robertson, Engin Kirda |
VirtualSwindle: an automated attack against in-app billing on android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 459-470, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anupam Das 0001, Nikita Borisov, Prateek Mittal, Matthew Caesar 0001 |
Re3: relay reliability reputation for anonymity systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 63-74, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Mödersheim, Luca Viganò 0001 |
Sufficient conditions for vertical composition of security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 435-446, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jaroslav Sedenka, Paolo Gasti |
Privacy-preserving distance computation and proximity testing on earth, done right. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 99-110, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jelena Isacenkova, Davide Balzarotti |
Shades of gray: a closer look at emails in the gray area. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 377-388, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi |
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 425-434, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Markus Kammerstetter, Christian Platzer, Wolfgang Kastner |
Prospect: peripheral proxying supported embedded code testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 329-340, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guowu Xie, Huy Hang, Michalis Faloutsos |
Scanner hunter: understanding HTTP scanning traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 27-38, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Timothy Vidas, Nicolas Christin |
Evading android runtime analysis via sandbox detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 447-458, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Georges Bossert, Frédéric Guihéry, Guillaume Hiet |
Towards automated protocol reverse engineering using semantic information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 51-62, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Viet Hung Nguyen, Fabio Massacci |
The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 493-498, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wilko Henecka, Thomas Schneider 0003 |
Faster secure two-party computation with less memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 437-446, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bharath K. Samanthula, Hu Chun, Wei Jiang |
An efficient and probabilistic secure bit-decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 541-546, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Cong Zhang 0001, Tsz Hon Yuen, Hao Xiong 0002, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He |
Multi-key leakage-resilient threshold cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 61-70, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Payas Gupta, Swapna Gottipati, Jing Jiang 0001, Debin Gao |
Your love is public now: questioning the use of personal information in authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 49-60, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Abedelaziz Mohaisen, Yongdae Kim |
Dynamix: anonymity on dynamic social structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 167-172, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mathy Vanhoef, Frank Piessens |
Practical verification of WPA-TKIP vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 427-436, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, Dengguo Feng |
Bind your phone number with caution: automated user profiling through address book matching on smartphone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 335-340, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kan Yang 0001, Xiaohua Jia, Kui Ren 0001 |
Attribute-based fine-grained access control with efficient revocation in cloud storage systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 523-528, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell |
An empirical study on the software integrity of virtual appliances: are you really getting what you paid for? ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 231-242, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi |
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 299-310, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Gugelmann, Dominik Schatzmann, Vincent Lenders |
Horizon extender: long-term preservation of data leakage evidence in web traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 499-504, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vaibhav Rastogi, Yan Chen 0004, Xuxian Jiang |
DroidChameleon: evaluating Android anti-malware against transformation attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 329-334, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Schrittwieser, Stefan Katzenbeisser 0001, Peter Kieseberg, Markus Huber 0001, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl |
Covert computation: hiding code in code for obfuscation purposes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 529-534, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nils Fleischhacker, Felix Günther 0001, Franziskus Kiefer, Mark Manulis, Bertram Poettering |
Pseudorandom signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 107-118, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xuhua Ding, HweeHwa Pang, Junzuo Lai |
Verifiable and private top-k monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 553-558, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rong Hu, Kirill Morozov, Tsuyoshi Takagi |
Proof of plaintext knowledge for code-based public-key encryption revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 535-540, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Tang 0001, Xiaofeng Chen 0001 |
Towards asymmetric searchable encryption with message recovery and flexible search authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 253-264, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Roch Lescuyer |
Protecting privacy by sanitizing personal data: a new approach to anonymous credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 381-392, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Cheng-Kang Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, Jianying Zhou 0001 |
Privacy-preserving smart metering with regional statistics and personal enquiry services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 369-380, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jun Zhang 0010, Chao Chen 0015, Yang Xiang 0001, Wanlei Zhou 0001 |
Robust network traffic identification with unknown applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 405-414, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Huiping Yao, Dongwan Shin |
Towards preventing QR code based attacks on android phone using security warnings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 341-346, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Amirreza Masoumzadeh 0001, James Joshi |
Privacy settings in social networking systems: what you cannot control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 149-154, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zhan Wang, Jiwu Jing, Liang Li 0003 |
Time evolving graphical password for securing mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 347-352, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kazuma Ohara, Yusuke Sakai 0001, Keita Emura, Goichiro Hanaoka |
A group signature scheme with unbounded message-dependent opening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 517-522, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aravind Prakash, Heng Yin 0001, Zhenkai Liang |
Enforcing system-wide control flow integrity for exploit detection and diagnosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 311-322, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang 0003, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig |
STRIDE: sanctuary trail - refuge from internet DDoS entrapment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 415-426, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiaowei Li 0003, Yuan Xue 0001 |
LogicScope: automatic discovery of logic vulnerabilities within web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 481-486, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hao Hao, Vicky Singh, Wenliang Du |
On the effectiveness of API-level access control using bytecode rewriting in Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 25-36, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ben Niu 0007, Gang Tan |
Efficient user-space information flow control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 131-142, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Dreier, Hugo Jonker, Pascal Lafourcade 0001 |
Defining verifiability in e-auction protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 547-552, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shams Zawoad, Amit Kumar Dutta, Ragib Hasan |
SecLaaS: secure logging-as-a-service for cloud forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 219-230, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Atighehchi, Traian Muntean |
Towards fully incremental cryptographic schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 505-510, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yihua Zhang, Marina Blanton |
Efficient dynamic provable possession of remote data via balanced update trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 183-194, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama |
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 83-94, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh |
Multi-channel broadcast encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 277-286, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kerschbaum |
An information-flow type-system for mixed protocol secure computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 393-404, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marina Blanton, Aaron Steele, Mehrdad Aliasgari |
Data-oblivious graph algorithms for secure computation and outsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 207-218, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xinxin Zhao, Lingjun Li, Guoliang Xue |
Secure cloud-assisted location based reminder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 323-328, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Wouter Joosen |
TabShots: client-side detection of tabnabbing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 447-456, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chao Zhang 0008, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres |
Protecting function pointers in binary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 487-492, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Yan 0001, Jin Han, Yingjiu Li, Jianying Zhou 0001, Robert H. Deng |
Designing leakage-resilient password entry on touchscreen mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 37-48, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, Wen-Guey Tzeng (eds.) |
8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![ACM, 978-1-4503-1767-2 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Wenbo Mao |
The role and effectiveness of cryptography in network virtualization: a position paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 179-182, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christian Hanser, Daniel Slamanig |
Blank digital signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 95-106, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim |
Trustworthy distributed computing on social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 155-160, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Guanxing Wen, Yuqing Zhang 0001, Qixu Liu, Dingning Yang |
Fuzzing the ActionScript virtual machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 457-468, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wu Zhou 0001, Xinwen Zhang, Xuxian Jiang |
AppInk: watermarking android apps for repackaging deterrence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 1-12, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami |
Comparative study of multicast authentication schemes with application to wide-area measurement system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 287-298, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Junzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen |
Expressive search on encrypted data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 243-252, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jia Xu 0006, Ee-Chien Chang, Jianying Zhou 0001 |
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 195-206, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Junxian Huang, Yinglian Xie, Fang Yu 0002, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao |
SocialWatch: detection of online service abuse via large-scale social graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 143-148, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz |
PSiOS: bring your own privacy & security to iOS devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 13-24, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yinghui Zhang 0002, Xiaofeng Chen 0001, Jin Li 0002, Duncan S. Wong, Hui Li 0006 |
Anonymous attribute-based encryption supporting efficient decryption test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 511-516, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tarik Moataz, Abdullatif Shikfa |
Boolean symmetric searchable encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 265-276, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Seyed Hossein Ahmadinejad, Philip W. L. Fong |
On the feasibility of inference attacks by third-party extensions to social network systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 161-166, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie 0001, Yongdae Kim |
Protecting access privacy of cached contents in information centric networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 173-178, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wenhai Sun, Bing Wang 0005, Ning Cao 0001, Ming Li 0003, Wenjing Lou, Y. Thomas Hou 0001, Hui Li 0006 |
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 71-82, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ragib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, Dustin Rinehart |
Sensing-enabled channels for hard-to-detect command and control of mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 469-480, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie 0001 |
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 353-358, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Clauß, Stefan Schiffner, Florian Kerschbaum |
k-anonymous reputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 359-368, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Davide Maiorca, Igino Corona, Giorgio Giacinto |
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013, pp. 119-130, 2013, ACM, 978-1-4503-1767-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Heung Youl Youm, Yoojae Won (eds.) |
7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![ACM, 978-1-4503-1648-4 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Viet Hung Nguyen, Fabio Massacci |
An independent validation of vulnerability discovery models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 6-7, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, Frank Piessens |
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 12-13, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David A. Wagner 0001 |
AdDroid: privilege separation for applications and advertisers in Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 71-72, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Wahbeh H. Qardaji, Ninghui Li |
Recursive partitioning and summarization: a practical framework for differentially private data publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 38-39, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Pelizzi, R. Sekar 0001 |
Protection, usability and improvements in reflected XSS filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 5, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Daniel A. Mayer, Susanne Wetzel |
Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 46-47, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jinwei Hu, Khaled M. Khan, Yun Bai 0001, Yan Zhang 0003 |
Constraint-enhanced role engineering via answer set programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 73-74, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Amit Vasudevan, Jonathan M. McCune, James Newsome, Adrian Perrig, Leendert van Doorn |
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 48-49, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Zhang 0001, Zhenfeng Zhang, Aijun Ge 0001 |
Ciphertext policy attribute-based encryption from lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 16-17, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu |
An efficient broadcast attack against NTRU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 22-23, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marina Blanton, Everaldo Aguiar |
Private and oblivious set and multiset operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 40-41, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Cristiano Giuffrida, Stefano Ortolani, Bruno Crispo |
Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 10-11, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim |
On the mixing time of directed social graphs and security implications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 36-37, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lingjun Li, Xinxin Zhao, Guoliang Xue |
An identity authentication protocol in online social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 28-29, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lei Xu 0012, Xiaoxin Wu 0001, Xinwen Zhang |
CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 87-88, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung |
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 57-58, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen 0004, Xitao Wen |
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 8-9, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Davis, Hao Chen 0003, Matthew K. Franklin |
Privacy-preserving alibi systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 34-35, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Joel Reardon, Claudio Marforio, Srdjan Capkun, David A. Basin |
User-level secure deletion on log-structured file systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 63-64, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto |
Practical client puzzles in the standard model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 42-43, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nikos Mavrogiannopoulos, Andreas Pashalidis, Bart Preneel |
Security implications in Kerberos by the introduction of smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 59-60, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhiwei Li, Weichao Wang |
Towards the attacker's view of protocol narrations (or, how to compile security protocols). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 44-45, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Khoongming Khoo, Chik How Tan |
New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 20-21, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shengzhi Zhang, Peng Liu 0005 |
Letting applications operate through attacks launched from compromised drivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 91-92, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sören Bleikertz, Anil Kurmus, Zoltán A. Nagy, Matthias Schunter |
Secure cloud maintenance: protecting workloads against insider attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 83-84, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|