The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "AsiaCCS"( http://dblp.L3S.de/Venues/AsiaCCS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asiaccs

Publication years (Num. hits)
2006 (55) 2007 (48) 2008 (42) 2009 (43) 2010 (38) 2011 (62) 2012 (48) 2013 (62) 2014 (52) 2015 (73) 2016 (85) 2017 (88) 2018 (78) 2019 (72) 2020 (88) 2021 (74) 2022 (113) 2023 (89)
Publication types (Num. hits)
inproceedings(1192) proceedings(18)
Venues (Conferences, Journals, ...)
AsiaCCS(1210)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 554 occurrences of 379 keywords

Results
Found 1210 publication records. Showing 1210 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Roberto Di Pietro, Alessandro Sorniotti Boosting efficiency and security in proof of ownership for deduplication. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jia Xu 0006, Ee-Chien Chang Towards efficient proofs of retrievability. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xinxin Zhao, Lingjun Li, Guoliang Xue Keeping identity secret in online social networks. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lei Jiang 0003, Jianlong Tan, Yanbing Liu ClusterFA: a memory-efficient DFA structure for network intrusion detection. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Junzuo Lai, Robert H. Deng, Yingjiu Li Expressive CP-ABE with partially hidden access structures. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eric Chan-Tin, Nicholas Hopper KoNKS: konsensus-style network koordinate system. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cheng Xu, Philip W. L. Fong The specification and compilation of obligation policies for program monitoring. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hayawardh Vijayakumar, Guruprasad Jakka, Sandra Julieta Rueda, Joshua Schiffman, Trent Jaeger Integrity walls: finding attack surfaces from mandatory access control policies. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Atefeh Mashatan, Khaled Ouafi Forgery-resilience for digital signature schemes. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Beng Heng Ng, Alexander Crowell, Atul Prakash 0001 Adaptive semi-private email aliases. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hung-Min Sun, Yao-Hsin Chen, Chiung-Cheng Fang, Shih-Ying Chang PassMap: a map based graphical-password authentication system. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ping Chen 0003, Dongyan Xu, Bing Mao CloudER: a framework for automatic software vulnerability location and patching in the cloud. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Young Hee Park, Salvatore J. Stolfo Software decoys for insider threat. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tzipora Halevi, Nitesh Saxena A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cheng-Kang Chu, Joseph K. Liu, Xinyi Huang 0001, Jianying Zhou 0001 Verifier-local revocation group signatures with time-bound keys. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Ian Goldberg, Aniket Kate, Tomas Toft Adding query privacy to robust DHTs. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum Outsourced private set intersection using homomorphic encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yu Seung Kim, Patrick Tague, Heejo Lee, Hyogon Kim Carving secure wi-fi zones with defensive jamming. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ninghui Li, Wahbeh H. Qardaji, Dong Su On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Payas Gupta, Xuhua Ding, Debin Gao Coercion resistance in authentication responsibility shifting. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Syed Fida Gillani, Ehab Al-Shaer, Sardar Ali, Syed Ali Khayam Monetizing spambot activity and understanding its relation with spambot traffic features. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chang-Han Jong, Virgil D. Gligor Discovering records of private VoIP calls without wiretapping. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, Shankar Sastry 0001 Attacks against process control systems: risk assessment, detection, and response. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  BibTeX  RDF
1Kirill Morozov, George Savvides Efficient computational oblivious transfer using interactive hashing. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Man Ho Au, Willy Susilo Server-aided signatures verification secure against collusion attack. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alexander Wiesmaier, Moritz Horsch, Johannes Braun 0001, Franziskus Kiefer, Detlef Hühnlein, Falko Strenzke, Johannes Buchmann 0001 An efficient mobile PACE implementation. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Cai-Sen Chen, Tao Wang A new and extended fault analysis on RSA. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Junghwan Rhee, Zhiqiang Lin, Dongyan Xu Characterizing kernel malware behavior with kernel data access patterns. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Adrienne Porter Felt, Matthew Finifter, Joel Weinberger, David A. Wagner 0001 Diesel: applying privilege separation to database access. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Guomin Yang, Chik How Tan Strongly secure certificateless key exchange without pairing. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jianjie Zhao, Dawu Gu, M. Choudary Gorantla Stronger security model of group key agreement. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zhiwei Li, Weichao Wang Rethinking about guessing attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lei Wei 0004, Scott E. Coull, Michael K. Reiter Bounded vector signatures and their applications. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Joonsang Baek, Jianying Zhou 0001 Compact identity-based encryption without strong symmetric cipher. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kazuhiro Minami, Nikita Borisov, Marianne Winslett, Adam J. Lee Confidentiality-preserving proof theories for distributed proof systems. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yue Sun, Meiqin Wang, Qiumei Sun How to search linear approximation for large non-surjective S-box. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sonia Jahid, Prateek Mittal, Nikita Borisov EASiER: encryption-based access control in social networks with efficient revocation. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ping Chen 0003, Xiao Xing, Bing Mao, Li Xie 0001, Xiaobin Shen 0001, Xinchun Yin Automatic construction of jump-oriented programming shellcode (on the x86). Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto An integrated approach to cryptographic mitigation of denial-of-service attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xiaoyun Wang 0001, Mingjie Liu, Chengliang Tian, Jingguo Bi Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problem. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou 0001 Identity-based online/offline key encapsulation and encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Cas Cremers Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani 0001 A statistical approach to botnet virulence estimation. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Matthias Berg, Boris Köpf Non-uniform distributions in quantitative information-flow. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David A. Basin, Samuel J. Burri, Günter Karjoth Separation of duties as a service. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qi Li 0002, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee, Ke Xu 0002 Enhancing the trust of internet routing with lightweight route attestation. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Zhenkai Liang Jump-oriented programming: a new class of code-reuse attack. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Miroslaw Kutylowski, Jun Shao 0001 1-out-of-2 signature. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stefan Fenz An ontology- and Bayesian-based approach for determining threat probabilities. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Young Hee Park, Douglas S. Reeves Deriving common malware behavior through graph clustering. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bin Liang 0002, Wei You, Wenchang Shi, Zhaohui Liang Detecting stealthy malware with inter-structure and imported signatures. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mark Manulis, Bertram Poettering Practical affiliation-hiding authentication from improved polynomial interpolation. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Cheng-Kang Chu, Wen Tao Zhu, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng Secure mobile subscription of sensor-encrypted data. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zach Jorgensen, Ting Yu 0001 On mouse dynamics as a behavioral biometric for authentication. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Joonsang Baek On the security of the identity-based encryption based on DHIES from ASIACCS 2010. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qiang Yan 0001, Jin Han, Yingjiu Li, Robert H. Deng, Tieyan Li A software-based root-of-trust primitive on multicore platforms. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Guanhua Yan, Guanling Chen, Stephan J. Eidenbenz, Nan Li Malware propagation in online social networks: nature, dynamics, and defense implications. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daisuke Moriyama, Tatsuaki Okamoto Leakage resilient eCK-secure key exchange protocol without random oracles. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jin Li 0002, Qiong Huang 0001, Xiaofeng Chen 0001, Sherman S. M. Chow, Duncan S. Wong, Dongqing Xie Multi-authority ciphertext-policy attribute-based encryption with accountability. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nan Li 0007, Yi Mu 0001, Willy Susilo, Fuchun Guo Self-certified ring signatures. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kazuomi Oishi, Tsutomu Matsumoto Self destructive tamper response for software protection. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li MLAS: multiple level authentication scheme for VANETs. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kevin Zhijie Chen, Guofei Gu, Jianwei Zhuge, Jose Nazario, Xinhui Han WebPatrol: automated collection and replay of web-based malware scenarios. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Francesco Alberti, Alessandro Armando, Silvio Ranise Efficient symbolic automated analysis of administrative attribute-based RBAC-policies. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ian M. Molloy, Ninghui Li Attack on the GridCode one-time password. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy ROPdefender: a detection tool to defend against return-oriented programming attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yongzheng Wu, Roland H. C. Yap Towards a binary integrity system for windows. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fubiao Xia, Guilin Wang, Rui Xue 0001 On the invisibility of designated confirmer signatures. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou 0001 Threshold ring signature without random oracles. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael S. Kirkpatrick, Sam Kerr, Elisa Bertino PUF ROKs: a hardware approach to read-once keys. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Andrew K. Adams, Adam J. Lee, Daniel Mossé Receipt-mode trust negotiation: efficient authorization through outsourced interactions. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Hongsong Shi Optimal message transmission protocols with flexible parameters. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qihua Wang, Hongxia Jin Quantified risk-adaptive access control for patient privacy protection in health information systems. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Huang Lin, Zhenfu Cao, Yuguang Fang, Muxin Zhou, Haojin Zhu How to design space efficient revocable IBE from non-monotonic ABE. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Gabriel Ghinita Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bruce S. N. Cheung, Lucas Chi Kwong Hui, Ravi S. Sandhu, Duncan S. Wong (eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011 Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  BibTeX  RDF
1Zhiyong Shan, Xin Wang 0001, Tzi-cker Chiueh Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sai Teja Peddinti, Nitesh Saxena On the effectiveness of anonymizing networks for web search privacy. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ragib Hasan, Marianne Winslett Efficient audit-based compliance for relational data retention. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bogdan Groza, Marius Minea Formal modelling and automatic detection of resource exhaustion attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Junjie Zhang 0004, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee, Nick Feamster Boosting the scalability of botnet detection using adaptive traffic sampling. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mansour Alsaleh, Paul C. van Oorschot Network scan detection with LQS: a lightweight, quick and stateful algorithm. Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Siva Anantharaman, Hai Lin 0005, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch Cap unification: application to protocol security modulo homomorphic encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secrecy analysis, protocol, rewriting, unification
1Byoungyoung Lee, Yuna Kim, Jong Kim 0001 binOb+: a framework for potent and stealthy binary obfuscation. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF binary obfuscation, stealth, windows SEH, reverse engineering, exception handling
1Tansu Alpcan, Cengiz Örencik, Albert Levi, Erkay Savas A game theoretic model for digital identity and trust in online communities. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF trust, game theory, online communities, digital identity
1Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson A hotspot-based protocol for attack traceback in mobile ad hoc networks. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF packet logging, path fragmentation, mobile ad-hoc networks, traceback, packet marking
1Pierangela Samarati, Sabrina De Capitani di Vimercati Data protection in outsourcing scenarios: issues and directions. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy, access control, encryption, confidentiality, data protection, data outsourcing, data fragmentation
1Yves Younan, Pieter Philippaerts, Lorenzo Cavallaro, R. Sekar 0001, Frank Piessens, Wouter Joosen PAriCheck: an efficient pointer arithmetic checker for C programs. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF bounds checking, buffer overflows
1Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu 0001, Keith Irwin Toward practical authorization-dependent user obligation systems. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF RBAC, policy, accountability, obligations, authorization systems
1Adam J. Lee, Ting Yu 0001, Yann Le Gall Effective trust management through a hybrid logical and relational approach. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF databases, trust, policy, reputation, credentials
1Adonis P. H. Fung, K. W. Cheung 0003 SSLock: sustaining the trust on entities brought by SSL. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SSL trust management, domain naming convention, man-in-the-middle attacks
1Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu Bureaucratic protocols for secure two-party sorting, selection, and permuting. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF bureaucratic protocols, oblivious algorithms, sorting, secure two-party computation
1Fernando Sanchez, Zhenhai Duan Region-based BGP announcement filtering for improved BGP security. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF BGP security, network prefix hijacking, BGP
1Lei Zhang 0004, Alexander Brodsky 0001, Sushil Jajodia Restoring compromised privacy in micro-data disclosure. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF micro-data disclosure, data privacy
1Jin Li 0002, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren 0001 Attribute-based signature and its applications. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF attribute-based, computational Diffie-Hellman assumption, anonymity, signature, predicate
1Benoît Libert, Moti Yung Dynamic fully forward-secure group signatures. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF key protection, anonymity, security modeling, group signatures, forward security, key exposure
1Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel A solution for the automated detection of clickjacking attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF ClickIDS, HTML IFRAME, browser plug-in, clickjacking, javascript, web security, CSS
1Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld A lattice-based approach to mashup security. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF web mashups, information flow, security policies, lattices, noninterference, declassification
Displaying result #901 - #1000 of 1210 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license