The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SP"( http://dblp.L3S.de/Venues/SP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sp

Publication years (Num. hits)
2008 (29) 2009 (27) 2020 (105) 2021 (115) 2022 (149) 2023 (198)
Publication types (Num. hits)
inproceedings(617) proceedings(6)
Venues (Conferences, Journals, ...)
SP(623)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 80 occurrences of 68 keywords

Results
Found 623 publication records. Showing 623 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Rakibul Hasan 0001, David J. Crandall, Mario Fritz, Apu Kapadia Automatically Detecting Bystanders in Photos to Reduce Privacy Risks. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen BIAS: Bluetooth Impersonation AttackS. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kit Murdock, David F. Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, Frank Piessens Plundervolt: Software-based Fault Injection Attacks against Intel SGX. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Haifeng Yu, Ivica Nikolic, Ruomu Hou, Prateek Saxena OHIE: Blockchain Scaling Made Simple. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Luca Wilke, Jan Wichelmann, Mathias Morbitzer, Thomas Eisenbarth 0001 SEVurity: No Security Without Integrity : Breaking Integrity-Free Memory Encryption with Minimal Assumptions. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nilo Redini, Aravind Machiry, Ruoyu Wang 0001, Chad Spensky, Andrea Continella, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sunil Manandhar, Kevin Moran, Kaushal Kafle, Ruhao Tang, Denys Poshyvanyk, Adwait Nadkarni Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sergej Proskurin, Marius Momeu, Seyedhamed Ghavamnia, Vasileios P. Kemerlis, Michalis Polychronakis xMP: Selective Memory Protection for Kernel and User Space. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador, Narseo Vallina-Rodriguez An Analysis of Pre-installed Android Software. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhichuang Sun, Bo Feng 0002, Long Lu, Somesh Jha OAT: Attesting Operation Integrity of Embedded Devices. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Anton Permenev, Dimitar K. Dimitrov 0002, Petar Tsankov, Dana Drachsler-Cohen, Martin T. Vechev VerX: Safety Verification of Smart Contracts. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ivan Pustogarov, Qian Wu, David Lie Ex-vivo dynamic analysis framework for Android device drivers. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chen Yan 0001, Hocheol Shin, Connor Bolton, Wenyuan Xu 0001, Yongdae Kim, Kevin Fu SoK: A Minimalist Approach to Formalizing Analog Sensor Security. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Laura Edelson, Tobias Lauinger, Damon McCoy A Security Analysis of the Facebook Ad Library. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21, 2020 Search on Bibsonomy SP The full citation details ... 2020 DBLP  BibTeX  RDF
1Rui Zhang 0068, Cynthia Sturton Transys: Leveraging Common Security Properties Across Hardware Designs. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jianbo Chen, Michael I. Jordan, Martin J. Wainwright HopSkipJumpAttack: A Query-Efficient Decision-Based Attack. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix C. Freiling, Zinaida Benenson Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mathy Vanhoef, Eyal Ronen Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhenkai Zhang, Zihao Zhan, Daniel Balasubramanian, Bo Li 0026, Péter Völgyesi, Xenofon D. Koutsoukos Leveraging EM Side-Channel Information to Detect Rowhammer Attacks. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Umar Iqbal 0002, Peter Snyder, Shitong Zhu, Benjamin Livshits, Zhiyun Qian, Zubair Shafiq AdGraph: A Graph-Based Approach to Ad and Tracker Blocking. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Qingchuan Zhao, Chaoshun Zuo, Brendan Dolan-Gavitt, Giancarlo Pellegrino, Zhiqiang Lin Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nishant Kumar 0001, Mayank Rathee, Nishanth Chandran, Divya Gupta 0001, Aseem Rastogi, Rahul Sharma 0001 CrypTFlow: Secure TensorFlow Inference. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marco Cominelli, Francesco Gringoli, Paul Patras, Margus Lind, Guevara Noubir Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dongdong She, Yizheng Chen 0001, Abhishek Shah, Baishakhi Ray, Suman Jana Neutaint: Efficient Dynamic Taint Analysis with Neural Networks. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jiaheng Zhang, Tiancheng Xie, Yupeng Zhang 0001, Dawn Song Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Elisabet Lobo Vesga, Alejandro Russo, Marco Gaboardi A Programming Framework for Differential Privacy with Accuracy Concentration Bounds. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jianping Zhu, Rui Hou 0001, XiaoFeng Wang 0001, Wenhao Wang 0001, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang 0002, Dan Meng Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren 0001, Maofan Yin Sync HotStuff: Simple and Practical Synchronous State Machine Replication. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Clemens Deußer, Steffen Passmann, Thorsten Strufe Browsing Unicity: On the Limits of Anonymizing Web Tracking Data. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fabio Pierazzi, Feargus Pendlebury, Jacopo Cortellazzi, Lorenzo Cavallaro Intriguing Properties of Adversarial ML Attacks in the Problem Space. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth, Adam J. Aviv This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sam Ainsworth 0001, Timothy M. Jones 0001 MarkUs: Drop-in use-after-free prevention for low-level languages. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Steve T. K. Jan, Qingying Hao, Tianrui Hu, Jiameng Pu, Sonal Oswal, Gang Wang 0011, Bimal Viswanath Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Elaine Shi Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1James Pavur, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic A Tale of Sea and Sky On the Security of Maritime VSAT Communications. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sean Bowe, Alessandro Chiesa, Matthew Green 0001, Ian Miers, Pratyush Mishra, Howard Wu ZEXE: Enabling Decentralized Private Computation. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Muoi Tran, Inho Choi, Gi Jun Moon, Anh V. Vu, Min Suk Kang A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Xudong Pan, Mi Zhang 0001, Shouling Ji, Min Yang 0002 Privacy Risks of General-Purpose Language Models. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li 0002, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, Ari Juels Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Savino Dambra, Leyla Bilge, Davide Balzarotti SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Meng Xu 0001, Sanidhya Kashyap, Hanqing Zhao, Taesoo Kim Krace: Data Race Fuzzing for Kernel File Systems. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Pardis Emami Naeini, Yuvraj Agarwal, Lorrie Faith Cranor, Hanan Hibshi Ask the Experts: What Should Be on an IoT Privacy and Security Label? Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lucian Cojocar, Jeremie S. Kim, Minesh Patel, Lillian Tsai, Stefan Saroiu, Alec Wolman, Onur Mutlu Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Feng Xiao, Jinquan Zhang, Jianwei Huang, Guofei Gu, Dinghao Wu, Peng Liu 0005 Unexpected Data Dependency Creation and Chaining: A New Attack to SDN. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Thomas Haines, Sarah Jamie Lewis, Olivier Pereira, Vanessa Teague How not to prove your election outcome. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhe Wang 0017, Chenggang Wu 0002, Mengyao Xie, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang 0002, Min Yang 0002 SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sushant Dinesh, Nathan Burow, Dongyan Xu, Mathias Payer RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mary Jean Amon, Rakibul Hasan 0001, Kurt Hugenberg, Bennett I. Bertenthal, Apu Kapadia Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tegan Brennan, Nicolás Rosner, Tevfik Bultan JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Luke Deshotels, Costin Carabas, Jordan Beichler, Razvan Deaconescu, William Enck Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Md Nahid Hossain, Sanaz Sheikhi, R. Sekar 0001 Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Brian Kondracki, Assel Aliyeva, Manuel Egele, Jason Polakis, Nick Nikiforakis Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Wajih Ul Hassan, Adam Bates 0001, Daniel Marino Tactical Provenance Analysis for Endpoint Detection and Response Systems. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Matthew Bernhard, Allison McDonald, Henry Meng, Jensen Hwa, Nakul Bajaj, Kevin Chang 0004, J. Alex Halderman Can Voters Detect Malicious Manipulation of Ballot Marking Devices? Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aiping Xiong, Tianhao Wang 0001, Ninghui Li, Somesh Jha Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jonathan Berger, Amit Klein 0001, Benny Pinkas Flaw Label: Exploiting IPv6 Flow Label. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jo Van Bulck, Daniel Moghimi, Michael Schwarz 0001, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, Frank Piessens LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Andrew Kwong, Daniel Genkin, Daniel Gruss, Yuval Yarom RAMBleed: Reading Bits in Memory Without Accessing Them. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marco Guarnieri, Boris Köpf, José F. Morales 0001, Jan Reineke 0001, Andrés Sánchez Spectector: Principled Detection of Speculative Information Flows. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ranjita Pai Kasturi, Yiting Sun, Ruian Duan, Omar Alrawi, Ehsan Asdar, Victor Zhu, Yonghwi Kwon 0001, Brendan Saltaformaggio TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jonathan Lee 0003, Kirill Nikitin 0001, Srinath T. V. Setty Replicated state machines without replicated execution. Search on Bibsonomy SP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Paolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, Engin Kirda Prospex: Protocol Specification Extraction. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons, Feng Xiao DSybil: Optimal Sybil-Resistance for Recommendation Systems. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xiang Cai, Yuwei Gui, Rob Johnson Exploiting Unix File-System Races via Algorithmic Complexity Attacks. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee Automatic Reverse Engineering of Malware Emulators. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Boris Köpf, Andrey Rybalchenko Automatic Discovery and Quantification of Information Leaks. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur Wirelessly Pickpocketing a Mifare Classic Card. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1William Clarkson, Tim Weyrich, Adam Finkelstein, Nadia Heninger, J. Alex Halderman, Edward W. Felten Fingerprinting Blank Paper Using Commodity Scanners. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Stuart E. Schechter, A. J. Bernheim Brush, Serge Egelman It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Arvind Narayanan, Vitaly Shmatikov De-anonymizing Social Networks. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Maxwell N. Krohn, Eran Tromer Noninterference for a Practical DIFC-Based Operating System. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson Plaintext Recovery Attacks against SSH. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Anupam Datta, Jason Franklin, Deepak Garg 0001, Dilsun Kirli Kaynar A Logic of Secure Systems and its Application to Trusted Computing. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Tongbo Chen, Markus Dürmuth, Hendrik P. A. Lensch, Martin Welk Tempest in a Teapot: Compromising Reflections Revisited. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1 30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA Search on Bibsonomy SP The full citation details ... 2009 DBLP  BibTeX  RDF
1Bart Coppens 0001, Ingrid Verbauwhede, Koen De Bosschere, Bjorn De Sutter Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michael T. Goodrich The Mastermind Attack on Genomic Data. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Santiago Zanella Béguelin, Gilles Barthe, Benjamin Grégoire, Federico Olmedo Formally Certifying the Security of Digital Signature Schemes. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Matt Weir, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek Password Cracking Using Probabilistic Context-Free Grammars. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1George Danezis, Ian Goldberg Sphinx: A Compact and Provably Secure Mix Format. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kevin Borders, Atul Prakash 0001 Quantifying Information Leaks in Outbound Web Traffic. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mike Ter Louw, V. N. Venkatakrishnan Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Adam Barth, Juan Caballero, Dawn Song Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar Native Client: A Sandbox for Portable, Untrusted x86 Native Code. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, Adrian Perrig CLAMP: Practical Prevention of Large-Scale Data Leaks. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ralf Küsters, Tomasz Truderung An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Koen Simoens, Pim Tuyls, Bart Preneel Privacy Weaknesses in Biometric Sketches. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, traffic analysis, voice over IP
1Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell Cloaker: Hardware Supported Rootkit Concealment. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, operating system, rootkit, ARM
1Chris Grier, Shuo Tang, Samuel T. King Secure Web Browsing with the OP Web Browser. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, browser, web security
1Weiqing Sun, R. Sekar 0001, Gaurav Poothia, Tejas Karandikar Practical Proactive Integrity Preservation: A Basis for Malware Defense. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, privacy, pervasive computing, implantable medical devices, medical safety
1Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Security, Key Establishment, Frequency Hopping, Anti-jamming
Displaying result #501 - #600 of 623 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license