The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "AsiaCCS"( http://dblp.L3S.de/Venues/AsiaCCS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asiaccs

Publication years (Num. hits)
2006 (55) 2007 (48) 2008 (42) 2009 (43) 2010 (38) 2011 (62) 2012 (48) 2013 (62) 2014 (52) 2015 (73) 2016 (85) 2017 (88) 2018 (78) 2019 (72) 2020 (88) 2021 (74) 2022 (113) 2023 (89)
Publication types (Num. hits)
inproceedings(1192) proceedings(18)
Venues (Conferences, Journals, ...)
AsiaCCS(1210)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 554 occurrences of 379 keywords

Results
Found 1210 publication records. Showing 1210 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Vireshwar Kumar, He Li 0007, Noah Luther, Pranav Asokan, Jung-Min "Jerry" Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Philipp Zieris, Julian Horsch A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hosung Park, Daeyong Kwon, Seungsoo Nam, Daeseon Choi POSTER: Address Authentication Based on Location History. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Joël Alwen, Peter Gazi, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár On the Memory-Hardness of Data-Independent Password-Hashing Functions. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ilias Giechaskiel, Kasper Bonne Rasmussen, Ken Eguro Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kyeong Joo Jung, Bang Hun Lee, Yeon Nam Gung, Jun Seok Kim, Hyung Suk Kim, Ju Seong Han, Tomaspeter Kim, Bong Jun Choi 0001 POSTER: Undetectable Task Bypassing OS Scheduler via Hardware Task Switching. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shang Gao 0006, Zecheng Li, Yuan Yao 0004, Bin Xiao 0001, Songtao Guo, Yuanyuan Yang 0001 Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anders P. K. Dalskov, Claudio Orlandi Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos le-git-imate: Towards Verifiable Web-based Git Repositories. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jayaprakash Selvaraj, Gökçen Yilmaz Dayanikli, Neelam Prabhu Gaunkar, David Ware, Ryan M. Gerdes, Mani Mina Electromagnetic Induction Attacks Against Embedded Systems. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Raphael Spreitzer, Felix Kirchengast, Daniel Gruss, Stefan Mangard ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Louis Waked, Mohammad Mannan, Amr M. Youssef To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wenjie Lu, Jun-Jie Zhou, Jun Sakuma Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani Side Channels in Deduplication: Trade-offs between Leakage and Efficiency. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone How Discover a Malware using Model Checking. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Drew Davidson, Yaohui Chen, Franklin George, Long Lu, Somesh Jha Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ramesh Karri, Ozgur Sinanoglu, Ahmad-Reza Sadeghi, Xun Yi (eds.) Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017 Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Samaneh Tajalizadehkhoob, Carlos Gañán, Arman Noroozian, Michel van Eeten The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vincent F. Taylor, Ivan Martinovic To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Scott A. Carr, Mathias Payer DataShield: Configurable Data Confidentiality and Integrity. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jiqiang Lu Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Aïda Diop, Nizar Kheir, Marie Paindavoine, Mohamed Sabt BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Amiangshu Bosu, Fang Liu, Danfeng (Daphne) Yao, Gang Wang 0011 Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade 0001, Cristina Onete, Jean-Marc Robert 0001 A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexandra Dmitrienko, David Noack, Moti Yung Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sandeep Tamrakar, Jian Liu 0012, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan The Circle Game: Scalable Private Membership Test Using Trusted Hardware. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Jens-Matthias Bohli, David Froelicher, Ghassan Karame Sharing Proofs of Retrievability across Tenants. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Xavier Carpent Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jyoti Gajrani, Li Li 0029, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti Detection of Information Leaks via Reflection in Android Apps. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ruan de Clercq, Ronald De Keulenaer, Pieter Maene, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede SCM: Secure Code Memory Architecture. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Eugene Kolodenker, William Koch, Gianluca Stringhini, Manuel Egele PayBreak: Defense Against Cryptographic Ransomware. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot Accurate Manipulation of Delay-based Internet Geolocation. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ivan Pustogarov, Thomas Ristenpart, Vitaly Shmatikov Using Program Analysis to Synthesize Sensor Spoofing Attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Behnaz Hassanshahi, Roland H. C. Yap Android Database Attacks Revisited. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vishal Karande, Erick Bauman, Zhiqiang Lin, Latifur Khan SGX-Log: Securing System Logs With SGX. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Partha S. Roop, Manoj Singh Gaur Detecting Inter-App Information Leakage Paths. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Unterluggauer, Mario Werner, Stefan Mangard Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chuadhry Mujeeb Ahmed, Carlos Murguia, Justin Ruths Model-based Attack Detection Scheme for Smart Water Distribution Networks. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andre Rein DRIVE: Dynamic Runtime Integrity Verification and Evaluation. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami Practical Black-Box Attacks against Machine Learning. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kosuke Kusano, Ichiro Takeuchi, Jun Sakuma Privacy-preserving and Optimal Interval Release for Disease Susceptibility. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Taehun Kim, Hyeonmin Ha, Seoyoon Choi, Jaeyeon Jung, Byung-Gon Chun Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xingliang Yuan, Yu Guo 0003, Xinyu Wang 0007, Cong Wang 0001, Baochun Li, Xiaohua Jia EncKV: An Encrypted Key-value Store with Rich Queries. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christof Paar Hardware Trojans and Other Threats against Embedded Systems. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mahmoud Barhamgi, Mu Yang, Chia-Mu Yu, Yijun Yu, Arosha K. Bandara, Djamal Benslimane, Bashar Nuseibeh Enabling End-Users to Protect their Privacy. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tianwei Zhang 0004, Yinqian Zhang, Ruby B. Lee DoS Attacks on Your Memory in Cloud. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1David M. Sommer 0001, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Krzysztof Grining, Marek Klonowski Towards Extending Noiseless Privacy: Dependent Data and More Practical Approach. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Francesco Mercaldo, Andrea Saracino BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Johannes Braun 0001, Johannes Buchmann 0001, Denise Demirel, Matthias Geihs, Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha, Ketan Vyas Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seunghun Cha, Sungsu Kwag, Hyoungshick Kim, Jun Ho Huh Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Keita Emura, Takuya Hayashi 0001, Noboru Kunihiro, Jun Sakuma Mis-operation Resistant Searchable Homomorphic Encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gregory Akers Advanced Security Research in the Era of the Internet of Things. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Arash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha 0001 WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kai Jansen, Matthias Schäfer 0002, Vincent Lenders, Christina Pöpper, Jens B. Schmitt Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gene Tsudik Security in Personal Genomics: Lest We Forget. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Omid Mirzaei, Guillermo Suarez-Tangil, Juan E. Tapiador, José María de Fuentes TriFlow: Triaging Android Applications using Speculative Information Flows. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mehmet Sinan Inci, Thomas Eisenbarth 0001, Berk Sunar Hit by the Bus: QoS Degradation Attack on Android. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chaoting Xuan, Gong Chen 0009, Erich Stuntebeck DroidPill: Pwn Your Daily-Use Apps. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dennis Felsch, Christian Mainka, Vladislav Mladenov, Jörg Schwenk SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmed Mahfouz, Tarek M. Mahmoud, Ahmed Sharaf Eldin A Behavioral Biometric Authentication Framework on Smartphones. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mathias Payer Control-Flow Hijacking: Are We Making Progress? Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Katharina Siobhan Kohls, Christina Pöpper Traffic Analysis Attacks in Anonymity Networks. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au, Surya Nepal An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hung Dang, Erick Purwanto, Ee-Chien Chang Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pierre-Alain Dupont, David Pointcheval Functional Encryption with Oblivious Helper. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohamed Elsabagh, Dan Fleck, Angelos Stavrou Strict Virtual Call Integrity Checking for C++ Binaries. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniele Midi, Mathias Payer, Elisa Bertino Memory Safety for Embedded Devices with nesCheck. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christian Weinert, Denise Demirel, Martín A. Gagliotti Vigil, Matthias Geihs, Johannes Buchmann 0001 MoPS: A Modular Protection Scheme for Long-Term Storage. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mathy Vanhoef, Domien Schepers, Frank Piessens Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jacob C. N. Schuldt, Kazumasa Shinagawa On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qian Feng, Minghua Wang, Mu Zhang 0001, Rundong Zhou, Andrew Henderson, Heng Yin 0001 Extracting Conditional Formulas for Cross-Platform Bug Search. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yongjun Zhao 0001, Sherman S. M. Chow Updatable Block-Level Message-Locked Encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yan Li 0075, Yao Cheng, Yingjiu Li, Robert H. Deng What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marco Rocchetto, Nils Ole Tippenhauer Towards Formal Security Analysis of Industrial Control Systems. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu 0009, Hongqi Zhang, Meng Li 0015 Quantitative Security Assessment Method based on Entropy for Moving Target Defense. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dima Rabadi, Rui Tan 0001, David K. Y. Yau, Sreejaya Viswanathan Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tom Chothia, Mihai Ordean, Joeri de Ruiter, Richard J. Thomas An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Berk Gülmezoglu, Thomas Eisenbarth 0001, Berk Sunar Cache-Based Application Detection in the Cloud Using Machine Learning. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cheng Huang 0003, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang 0002, Christopher Kruegel, Giovanni Vigna Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yue Chen, Mustakimur Khandaker, Zhi Wang 0004 Pinpointing Vulnerabilities. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1He Huang, Amr M. Youssef, Mourad Debbabi BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Baljit Singh, Dmitry Evtyushkin, Jesse Elwell, Ryan Riley, Iliano Cervesato On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Taeho Lee 0003, Christos Pappas, Adrian Perrig, Virgil D. Gligor, Yih-Chun Hu The Case for In-Network Replay Suppression. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1David Pointcheval, Guilin Wang VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hao Chen, Daojing He, Sencun Zhu, Jingshun Yang Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache The Case for System Command Encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Will Scott A Secure, Practical & Safe Packet Spoofing Service. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xavier Carpent, Karim El Defrawy, Norrathep Rattanavipanon, Gene Tsudik Lightweight Swarm Attestation: A Tale of Two LISA-s. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Quan Chen, Ahmed M. Azab, Guruprasad Ganesh, Peng Ning PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ding Wang 0002, Qianchen Gu, Xinyi Huang 0001, Ping Wang 0003 Understanding Human-Chosen PINs: Characteristics, Distribution and Security. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 1210 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license