The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "AsiaCCS"( http://dblp.L3S.de/Venues/AsiaCCS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asiaccs

Publication years (Num. hits)
2006 (55) 2007 (48) 2008 (42) 2009 (43) 2010 (38) 2011 (62) 2012 (48) 2013 (62) 2014 (52) 2015 (73) 2016 (85) 2017 (88) 2018 (78) 2019 (72) 2020 (88) 2021 (74) 2022 (113) 2023 (89)
Publication types (Num. hits)
inproceedings(1192) proceedings(18)
Venues (Conferences, Journals, ...)
AsiaCCS(1210)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 554 occurrences of 379 keywords

Results
Found 1210 publication records. Showing 1210 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Huseyin Ulusoy, Pietro Colombo, Elena Ferrari, Murat Kantarcioglu, Erman Pattuk GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yan Zhu 0010, Xin Wang, Di Ma, Ruiqi Guo Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hua Deng, Qianhong Wu, Bo Qin, Willy Susilo, Joseph K. Liu, Wenchang Shi Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jianxiong Shao, Yu Qin, Dengguo Feng, Weijin Wang Formal Analysis of Enhanced Authorization in the TPM 2.0. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gang Xu, George T. Amariucai, Yong Guan Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sungjae Hwang, Sungho Lee, Yongdae Kim, Sukyoung Ryu Bittersweet ADB: Attacks and Defenses. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wei-Yen Day, Ninghui Li Differentially Private Publishing of High-dimensional Data Using Sensitivity Control. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lucjan Hanzlik, Przemyslaw Kubiak 0001, Miroslaw Kutylowski Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, Steven Miller 0003, Jianying Zhou 0001, Gail-Joon Ahn (eds.) Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  BibTeX  RDF
1Philippe Owezarski A Near Real-Time Algorithm for Autonomous Identification and Characterization of Honeypot Attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson, Mario Strefler A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gökay Saldamli, Richard Chow, Hongxia Jin Albatross: A Privacy-Preserving Location Sharing System. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhi-Kai Zhang, Michael Cheng Yi Cho, Shiuhpyng Shieh Emerging Security Threats and Countermeasures in IoT. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chris Y. T. Ma, David K. Y. Yau On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Paul-Edmond Berthier, Stéphane Cauchie, Zonghua Zhang Secure PUFs-Based Cipher Suite for Enabling TLS to Authenticate Hardware Devices. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hao Sun, Xiangyu Zhang 0001, Chao Su, Qingkai Zeng 0002 Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu Attribute-Based Access Control Models and Beyond. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Heqing Huang, Kai Chen 0012, Chuangang Ren, Peng Liu 0005, Sencun Zhu, Dinghao Wu Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rong Cheng, Jingbo Yan, Chaowen Guan, Fangguo Zhang, Kui Ren 0001 Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Girish Revadigar, Chitra Javali, Hassan Jameel Asghar, Kasper Bonne Rasmussen, Sanjay Jha 0001 iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xun Yi, Fang-Yu Rao, Elisa Bertino, Athman Bouguettaya Privacy-Preserving Association Rule Mining in Cloud Computing. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Nuñez 0001, Isaac Agudo, Javier López 0001 NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yajin Zhou, Kunal Patel, Lei Wu 0012, Zhi Wang 0004, Xuxian Jiang Hybrid User-level Sandboxing of Third-party Android Apps. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Junjie Wang 0007, Yinxing Xue, Yang Liu 0003, Tian Huat Tan JSDC: A Hybrid Approach for JavaScript Malware Detection and Classification. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nan Li 0007, Yi Mu 0001, Willy Susilo, Vijay Varadharajan Anonymous Yoking-Group Proofs. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wei You, Bin Liang 0002, Jingzhe Li, Wenchang Shi, Xiangyu Zhang 0001 Android Implicit Information Flow Demystified. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Olivier Levillain, Baptiste Gourdin, Hervé Debar TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Carlos Gañán, Orçun Çetin, Michel van Eeten An Empirical Analysis of ZeuS C&C Lifetime. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Guanhua Yan Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for Automated Malware Classification. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marina Krotofil, Jason Larsen, Dieter Gollmann The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chung Hwan Kim, Sungjin Park 0001, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch Anonymizing Social Graphs via Uncertainty Semantics. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nitin Chiluka, Nazareno Andrade, Johan A. Pouwelse, Henk J. Sips Social Networks Meet Distributed Systems: Towards a Robust Sybil Defense under Churn. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yantian Hou, Ming Li 0003, Ruchir Chauhan, Ryan M. Gerdes, Kai Zeng 0001 Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Markus Miettinen, N. Asokan, Farinaz Koushanfar, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula I Know Where You are: Proofs of Presence Resilient to Malicious Provers. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jiazhe Chen, Mingjie Liu, Hexin Li, Hongsong Shi Mind Your Nonces Moving: Template-Based Partially-Sharing Nonces Attack on SM2 Digital Signature Algorithm. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Haoyu Ma, Kangjie Lu, Xinjie Ma, Haining Zhang, Chunfu Jia, Debin Gao Software Watermarking using Return-Oriented Programming. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yifeng Zheng, Xingliang Yuan, Xinyu Wang 0007, Jinghua Jiang, Cong Wang 0001, Xiaolin Gui Enabling Encrypted Cloud Media Center with Secure Deduplication. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Min Zheng, Hui Xue 0003, Yulong Zhang, Tao Wei, John C. S. Lui Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yuan Yao, Bin Zhang 0003, Wenling Wu A Single Query Forgery Attack on Raviyoyla v1. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou TrustLogin: Securing Password-Login on Commodity Operating Systems. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth 0001, Berk Sunar Lucky 13 Strikes Back. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhe Liu 0001, Hwajeong Seo, Zhi Hu, Xinyi Huang 0001, Johann Großschädl Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tsz Hon Yuen, Cong Zhang 0001, Sherman S. M. Chow, Siu-Ming Yiu Related Randomness Attacks for Public Key Cryptosystems. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Enrico Bacis, Simone Mutti, Stefano Paraboschi AppPolicyModules: Mandatory Access Control for Third-Party Apps. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Haibo Tian, Fangguo Zhang, Kui Ren 0001 Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Konstantin Böttinger, Dieter Schuster, Claudia Eckert 0001 Detecting Fingerprinted Data in TLS Traffic. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anirban Basu 0001, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Yung Shin Van Der Sype, Yutaka Miyake Practical Private One-way Anonymous Message Routing. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lee Wang Hao, Murali Srirangam Ramanujam, S. P. T. Krishnan On Designing an Efficient Distributed Black-Box Fuzzing System for Mobile Devices. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Soodeh Dadras, Ryan M. Gerdes, Rajnikant Sharma Vehicular Platooning in an Adversarial Environment. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiang Cai, Rucha Lale, Xin Cheng Zhang, Rob Johnson Fixing Races For Good: Portable and Reliable UNIX File-System Race Detection. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahmad-Reza Sadeghi XiOS: Extended Application Sandboxing on iOS. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1James Alderman, Christian Janson, Carlos Cid, Jason Crampton Access Control in Publicly Verifiable Outsourced Computation. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yueqiang Cheng, Xuhua Ding, Robert H. Deng Efficient Virtualization-Based Application Protection Against Untrusted Operating System. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai 0001, Keisuke Tanaka Disavowable Public Key Encryption with Non-interactive Opening. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel Arp, Fabian Yamaguchi, Konrad Rieck Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thurston H. Y. Dang, Petros Maniatis, David A. Wagner 0001 The Performance Cost of Shadow Stacks and Stack Canaries. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kun Yang, Jianwei Zhuge, Yongke Wang, Lujue Zhou, Hai-Xin Duan IntentFuzzer: detecting capability leaks of android applications. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sébastien Gambs, Cristina Onete, Jean-Marc Robert 0001 Prover anonymous and deniable distance-bounding authentication. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Davide Canali, Leyla Bilge, Davide Balzarotti On the effectiveness of risk prediction based on users browsing behavior. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hongbo Liu 0002, Yan Wang 0003, Jian Liu 0001, Jie Yang 0003, Yingying Chen 0001 Practical user authentication leveraging channel state information (CSI). Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bisheng Liu, Urs Hengartner pTwitterRec: a privacy-preserving personalized tweet recommendation framework. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Qingji Zheng, Wei Zhu, Jiafeng Zhu, Xinwen Zhang Improved anonymous proxy re-encryption with CCA security. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wenbo Yang, Juanru Li, Yuanyuan Zhang 0002, Yong Li, Junliang Shu, Dawu Gu APKLancet: tumor payload diagnosis and purification for android applications. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hu Chun, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya, Wei Jiang Outsourceable two-party privacy-preserving biometric authentication. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mu Zhang 0001, Heng Yin 0001 Efficient, context-aware privacy leakage confinement for android applications without firmware modding. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Muhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, Giovanni Russello PIDGIN: privacy-preserving interest and content sharing in opportunistic networks. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Junzuo Lai, Robert H. Deng, Yingjiu Li, Jian Weng 0001 Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ben Stock, Martin Johns Protecting users against XSS-based password manager abuse. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rasib Khan, Shams Zawoad, Munirul M. Haque, Ragib Hasan OTIT: towards secure provenance modeling for location proofs. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chengfang Fang, Ee-Chien Chang Differential privacy with δ-neighbourhood for spatial and dynamic datasets. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mahdi Nasrullah Al-Ameen, Matthew K. Wright Design and evaluation of persea, a sybil-resistant DHT. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Min Zheng, Mingshen Sun, John C. S. Lui DroidRay: a security evaluation system for customized android firmwares. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao 0010, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sascha Fahl, Yasemin Acar, Henning Perl, Matthew Smith 0001 Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jakub Szefer, Pramod A. Jamkhedkar, Diego Perez-Botero, Ruby B. Lee Cyber defenses for physical attacks and insider threats in cloud computing. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon, Christoph Neumann 0001 On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Benjamin Johnson 0001, Aron Laszka, Jens Grossklags How many down?: toward understanding systematic risk in networks. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hao Zhang 0023, Danfeng (Daphne) Yao, Naren Ramakrishnan Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tobias Wüchner, Martín Ochoa, Alexander Pretschner Malware detection with quantitative data flow graphs. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Su Zhang, Xinwen Zhang, Xinming Ou After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gianluca Stringhini, Oliver Hohlfeld, Christopher Kruegel, Giovanni Vigna The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Janaka Alawatugoda 0001, Douglas Stebila, Colin Boyd Modelling after-the-fact leakage for key exchange. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xingjie Yu, Zhan Wang, Kun Sun 0001, Wen Tao Zhu, Neng Gao, Jiwu Jing Remotely wiping sensitive data on stolen smartphones. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shiho Moriai, Trent Jaeger, Kouichi Sakurai (eds.) 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014 Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  BibTeX  RDF
1Quoc-Sang Phan, Pasquale Malacaria Abstract model counting: a novel approach for quantification of information leaks. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tiffany Hyun-Jin Kim, H. Colleen Stuart, Hsu-Chun Hsiao, Yue-Hsun Lin, Leon Zhang, Laura Dabbish, Sara B. Kiesler YourPassword: applying feedback loops to improve security behavior of managing multiple passwords. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christopher Kruegel Fighting malicious code: an eternal struggle. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik Covert ephemeral communication in named data networking. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan ConXsense: automated context classification for context-aware access control. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Boyang Wang, Yantian Hou, Ming Li 0003, Haitao Wang 0001, Hui Li 0006 Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rong Jin 0002, Xianru Du, Zi Deng, Kai Zeng 0001, Jing Xu 0005 Practical secret key agreement for full-duplex near field communications. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dongxi Liu, Elisa Bertino, Xun Yi Privacy of outsourced k-means clustering. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Adonis P. H. Fung, Tielei Wang, K. W. Cheung 0003, Tsz-Yeung Wong Scanning of real-world web applications for parameter tampering vulnerabilities. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alexandre Pinto, Bertram Poettering, Jacob C. N. Schuldt Multi-recipient encryption, revisited. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fabian Lanze, Andriy Panchenko 0001, Benjamin Braatz, Thomas Engel 0001 Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 1210 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license