The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NDSS"( http://dblp.L3S.de/Venues/NDSS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ndss

Publication years (Num. hits)
1995 (18) 1996 (18) 1997 (15) 1998 (22) 1999 (24) 2000 (16) 2001 (19) 2002 (16) 2003 (18) 2004 (17) 2005 (17) 2006 (18) 2007 (18) 2008 (22) 2009 (21) 2010 (25) 2011 (29) 2012 (55) 2013 (65) 2014 (56) 2015 (51) 2016 (62) 2017 (69) 2018 (72) 2019 (91) 2020 (90) 2021 (88) 2022 (84) 2023 (95)
Publication types (Num. hits)
inproceedings(1182) proceedings(29)
Venues (Conferences, Journals, ...)
NDSS(1211)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1211 publication records. Showing 1211 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Riad S. Wahby, Srinath T. V. Setty, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish Efficient RAM and control flow in verifiable outsourced computation. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed 0001, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang 0001, Carl A. Gunter What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Jonas Zaddach, Luca Bruno, Aurélien Francillon, Davide Balzarotti AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner 0001 Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Christian Rossow Amplification Hell: Revisiting Network Protocols for DDoS Abuse. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Dongseok Jang, Zachary Tatlock, Sorin Lerner SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Capkun Smartphones as Practical and Secure Location Verification Tokens for Payments. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Mu Zhang 0001, Heng Yin 0001 AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Adam Bates 0001, Ryan Leonard, Hannah Pruse, Daniel Lowd, Kevin R. B. Butler Leveraging USB to Establish Host Identity Using Commodity Devices. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Muhammad Naveed 0001, Xiao-yong Zhou, Soteris Demetriou, XiaoFeng Wang 0001, Carl A. Gunter Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Christina Garman, Matthew Green 0001, Ian Miers Decentralized Anonymous Credentials. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Mark Dermot Ryan Enhanced Certificate Transparency and End-to-End Encrypted Mail. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Michael Dietz, Dan S. Wallach Hardening Persona - Improving Federated Web Login. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Arnar Birgisson, Joe Gibbs Politz, Úlfar Erlingsson, Ankur Taly, Michael Vrable, Mark Lentczner Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Anupam Das 0001, Joseph Bonneau, Matthew Caesar 0001, Nikita Borisov, XiaoFeng Wang 0001 The Tangled Web of Password Reuse. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Robert Templeman, Mohammed Korayem, David J. Crandall, Apu Kapadia PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Arik Friedman, Izchak Sharfman, Daniel Keren, Assaf Schuster Privacy-Preserving Distributed Stream Monitoring. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Kasper Bonne Rasmussen, Marc Roeschlin, Ivan Martinovic, Gene Tsudik Authentication Using Pulse-Response Biometrics. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Maliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena, Naveen Nathan Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov No Direction Home: The True Cost of Routing Around Decoys. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Fangqi Sun, Liang Xu, Zhendong Su 0001 Detecting Logic Vulnerabilities in E-commerce Applications. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Arnis Parsovs Practical Issues with TLS Client Certificate Authentication. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan Efficient Private File Retrieval by Combining ORAM and PIR. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Qing Zhang 0012, David Y. Wang, Geoffrey M. Voelker DSpin: Detecting Automatically Spun Content on the Web. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Lukasz Olejnik, Minh-Dung Tran, Claude Castelluccia Selling off User Privacy at Auction. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Younghwan Go, Eunyoung Jeong, Jongil Won, Yongdae Kim, Denis Foo Kune, KyoungSoo Park Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Sebastian Vogl, Jonas Pfoh, Thomas Kittel 0001, Claudia Eckert 0001 Persistent Data-only Malware: Function Hooks without Code. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Yueqiang Cheng, Zongwei Zhou, Miao Yu, Xuhua Ding, Robert H. Deng ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko Botcoin: Monetizing Stolen Cycles. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Alireza Saberi, Yangchun Fu, Zhiqiang Lin Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Siegfried Rasthofer, Steven Arzt, Eric Bodden A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Chiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang, Xuxian Jiang AirBag: Boosting Smartphone Resistance to Malware Infection. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Rafael Veras, Christopher Collins 0001, Julie Thorpe On Semantic Patterns of Passwords and their Security Impact. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1David Sounthiraraj, Justin Sahs, Garret Greenwood, Zhiqiang Lin, Latifur Khan SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014 Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Yeongjin Jang, Simon P. Chung, Bryan D. Payne, Wenke Lee Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Emil Stefanov, Charalampos Papamanthou, Elaine Shi Practical Dynamic Searchable Encryption with Small Leakage. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan 0001 Privacy through Pseudonymity in Mobile Telephony Systems. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Zhang Xu, Haining Wang, Zichen Xu 0001, Xiaorui Wang Power Attack: An Increasing Threat to Data Centers. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Antoine Delignat-Lavaud, Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie Web PKI: Closing the Gap between Guidelines and Practices. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Xavier de Carné de Carnavalet, Mohammad Mannan From Very Weak to Very Strong: Analyzing Password-Strength Meters. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Matthias Schulz 0001, Adrian Loch, Matthias Hollick Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Bo Chen, Reza Curtmola Auditable Version Control Systems. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Sanorita Dey, Nirupam Roy, Wenyuan Xu 0001, Romit Roy Choudhury, Srihari Nelakuditi AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Ajaya Neupane, Nitesh Saxena, Keya Kuruvilla, Michael Georgescu, Rajesh K. Kana Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Jing Zhang 0027, Zakir Durumeric, Michael D. Bailey, Mingyan Liu, Manish Karir On the Mismanagement and Maliciousness of Networks. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Rob Jansen, Florian Tschorsch, Aaron Johnson 0001, Björn Scheuermann 0001 The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Chia-Chi Lin, Hongyang Li, Xiao-yong Zhou, XiaoFeng Wang 0001 Screenmilker: How to Milk Your Android Screen for Secrets. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Stephen E. McLaughlin, Saman A. Zonouz, Devin J. Pohly, Patrick D. McDaniel A Trusted Safety Verifier for Process Controller Code. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Martin Georgiev, Suman Jana, Vitaly Shmatikov Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Giancarlo Pellegrino, Davide Balzarotti Toward Black-Box Detection of Logic Flaws in Web Applications. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Antonio Nappa, Zhaoyan Xu, M. Zubair Rafique, Juan Caballero, Guofei Gu CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Christopher Kruegel, Sabyasachi Saha, Giovanni Vigna, Sung-Ju Lee, Marco Mellia Nazca: Detecting Malware Distribution in Large-Scale Networks. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Johannes Dahse, Thorsten Holz Simulation of Built-in PHP Features for Precise Static Code Analysis. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing Copker: Computing with Private Keys without RAM. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi, Markus Jakobsson Scambaiter: Understanding Targeted Nigerian Scams on Craigslist. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
1Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Luyi Xing, Yangyi Chen, XiaoFeng Wang 0001, Shuo Chen 0001 InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1David Y. Wang, Stefan Savage, Geoffrey M. Voelker Juice: A Longitudinal Study of an SEO Botnet. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Thomas Hutton General Chair's Message. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Lingjun Li, Xinxin Zhao, Guoliang Xue Unobservable Re-authentication for Smartphones. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas Hopper rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Aldo Cassola, William K. Robertson, Engin Kirda, Guevara Noubir A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Guofei Gu, Mabry Tyson FRESCO: Modular Composable Security Services for Software-Defined Networks. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele Secure Computation on Floating Point Numbers. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell Assessing software integrity of virtual appliances through software whitelists. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Kevin Zhijie Chen, Noah M. Johnson, Vijay D'Silva, Shuaifu Dai, Kyle MacNamara, Thomas R. Magrino, Edward XueJun Wu, Martin C. Rinard, Dawn Xiaodong Song Contextual Policy Enforcement in Android Applications with Permission Event Graphs. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Jialong Zhang, Guofei Gu NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Andrew M. White 0002, Srinivas Krishnan, Michael D. Bailey, Fabian Monrose, Phillip A. Porras Clear and Present Data: Opaque Traffic and its Security Implications for the Future. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Robert A. Cochran, Michael K. Reiter Toward Online Verification of Client Behavior in Distributed Applications. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Nedim Srndic, Pavel Laskov Detection of Malicious PDF Files Based on Hierarchical Document Structure. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Davide Canali, Davide Balzarotti Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Mohammad Ashiqur Rahman, Ehab Al-Shaer Metrics for Automated Network Security Design. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Vaibhav Garg, L. Jean Camp Macroeconomic Analysis of Malware. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Mu Zhang 0001, Heng Yin 0001 TransBlocker: Transforming and Taming Privacy-Breaching Android Applications. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Peng Ning Program Chair's Message. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Stephen Smalley, Robert Craig Security Enhanced (SE) Android: Bringing Flexible MAC to Android. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Richard A. Kemmerer 20 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Michael Backes 0001, Goran Doychev, Boris Köpf Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Manuel Egele, Gianluca Stringhini, Christopher Krügel, Giovanni Vigna COMPA: Detecting Compromised Accounts on Social Networks. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1David Irakiza, Md. Enamul Karim, Vir V. Phoha A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Jing Tian, Chengzhang Qu, Wenyuan Xu 0001, Song Wang 0002 KinWrite: Handwriting-Based Authentication Using Kinect. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Davide Zanetti, Srdjan Capkun, Ari Juels Tailing RFID Tags for Clone Detection. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Anil Kurmus, Reinhard Tartler, Daniela Dorneanu, Bernhard Heinloth, Valentin Rothberg, Andreas Ruprecht, Wolfgang Schröder-Preikschat, Daniel Lohmann, Rüdiger Kapitza Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu 0002, Kui Ren 0001, Nan Zhang 0004, Xinwen Fu How Privacy Leaks From Bluetooth Mouse? Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Jin Han, Qiang Yan 0001, Debin Gao, Jianying Zhou 0001, Robert H. Deng Comparing Mobile Privacy Protection through Cross-Platform Applications. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Sooel Son, Vitaly Shmatikov The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Moheeb Abu Rajab, Lucas Ballard, Noe Lutz, Panayiotis Mavrommatis, Niels Provos CAMP: Content-Agnostic Malware Protection. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013 Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Joe Sullivan You Can't Do Today's Security With Yesterday's Methods. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Chris Wacek, Henry Tan, Kevin S. Bauer, Micah Sherr An Empirical Evaluation of Relay Selection in Tor. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Gang Wang 0011, Manish Mohanlal, Christo Wilson, Xiao Wang 0018, Miriam J. Metzger, Haitao Zheng 0001, Ben Y. Zhao Social Turing Tests: Crowdsourcing Sybil Detection. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Ory Samorodnitzky, Eran Tromer, Avishai Wool Analyzing Unique-Bid Auction Sites for Fun and Profit. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun 0001, Yang Liu 0003, Jin Song Dong AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Raghav Bhaskar, Saikat Guha, Srivatsan Laxman, Prasad Naldurg Verito: A Practical System for Transparency and Accountability in Virtual Economies. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Erman Ayday, Jean Louis Raisaro, Jean-Pierre Hubaux Privacy-Enhancing Technologies for Medical Tests Using Genomic Data. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
Displaying result #701 - #800 of 1211 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license