The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NDSS"( http://dblp.L3S.de/Venues/NDSS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ndss

Publication years (Num. hits)
1995 (18) 1996 (18) 1997 (15) 1998 (22) 1999 (24) 2000 (16) 2001 (19) 2002 (16) 2003 (18) 2004 (17) 2005 (17) 2006 (18) 2007 (18) 2008 (22) 2009 (21) 2010 (25) 2011 (29) 2012 (55) 2013 (65) 2014 (56) 2015 (51) 2016 (62) 2017 (69) 2018 (72) 2019 (91) 2020 (90) 2021 (88) 2022 (84) 2023 (95)
Publication types (Num. hits)
inproceedings(1182) proceedings(29)
Venues (Conferences, Journals, ...)
NDSS(1211)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1211 publication records. Showing 1211 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller Updates from the Internet Backbone: An RPKI/RTR Router Implementation, Measurements, and Analysis Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Prateek Mittal, Charalampos Papamanthou, Dawn Xiaodong Song Preserving Link Privacy in Social Network Based Systems. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Stephen Smalley Laying a Secure Foundation for Mobile Devices. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Chiachih Wu, Zhi Wang 0004, Xuxian Jiang Taming Hosted Hypervisors with (Mostly) Deprivileged Execution. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Tobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov Fix Me Up: Repairing Access-Control Bugs in Web Applications. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Ralf Hund, Carsten Willems, Thorsten Holz Practical Timing Side Channel Attacks Against Kernel Space ASLR. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Cong Wang 0001, Zhen Xu, Kui Ren 0001, Janet Meiling Wang OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Shobha Venkataraman, David Brumley, Subhabrata Sen, Oliver Spatscheck Automatically Inferring the Evolution of Malicious Activity on the Internet. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Prateek Mittal, Matthew K. Wright, Nikita Borisov Pisces: Anonymous Communication Using Social Networks. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Giuseppe Ateniese, Giuseppe Bianchi 0001, Angelo Capossele, Chiara Petrioli Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Emil Stefanov, Elaine Shi ObliviStore: High Performance Oblivious Distributed Cloud Data Store. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Florian Kerschbaum, Thomas Schneider 0003, Axel Schröpfer Automatic Protocol Selection in Secure Two-Party Computations. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Yajin Zhou, Xuxian Jiang Detecting Passive Content Leaks and Pollution in Android Applications. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Ryan Henry, Yizhou Huang, Ian Goldberg One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Junjie Zhang 0004, Yinglian Xie, Fang Yu 0002, David Soukal, Wenke Lee Intention and Origination: An Inside Look at Large-Scale Bot Queries. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Rob Jansen, Aaron Johnson 0001, Paul F. Syverson LIRA: Lightweight Incentivized Routing for Anonymity. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Ang Cui, Michael Costello, Salvatore J. Stolfo When Firmware Modifications Attack: A Case Study of Embedded Exploitation. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Chee Meng Tey, Payas Gupta, Debin Gao I can be You: Questioning the use of Keystroke Dynamics as Biometrics. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Robert Templeman, Zahid Rahman, David J. Crandall, Apu Kapadia PlaceRaider: Virtual Theft in Physical Spaces with Smartphones. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Kyu Hyung Lee, Xiangyu Zhang 0001, Dongyan Xu High Accuracy Attack Provenance via Binary-based Execution Partition. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Adam Skillen, Mohammad Mannan On Implementing Deniable Storage Encryption for Mobile Devices. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Chaabane Abdelberi, Gergely Ács, Mohamed Ali Kâafar You are what you like! Information leakage through users' Interests. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang 0001, Dongyan Xu Discovering Semantic Data of Interest from Un-mappable Memory with Confidence. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun Distance Hijacking Attacks on Distance Bounding Protocols. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Lok-Kwong Yan, Manjukumar Jayachandra, Mu Zhang 0001, Heng Yin 0001 Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen 0004 PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Joseph A. Akinyele, Matthew Green 0001, Aviel D. Rubin Charm: A Framework for Rapidly Prototyping Cryptosystems. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Ting-Fang Yen, Yinglian Xie, Fang Yu 0002, Roger Peng Yu, Martín Abadi Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Rob Jansen, Nicholas Hopper Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber 0001, Edgar R. Weippl Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Hyojeong Lee, Jeff Seibert, Charles Edwin Killian, Cristina Nita-Rotaru Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda, Davide Balzarotti Insights into User Behavior in Dealing with Internet Attacks. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Nico Golde, Kevin Redon, Ravishankar Borgaonkar Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer 0005, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Prateek Mittal, Matthew Caesar 0001, Nikita Borisov X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Xin Zhang 0003, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Patrick Tague ShortMAC: Efficient Data-Plane Fault Localization. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Michael C. Grace, Yajin Zhou, Zhi Wang 0004, Xuxian Jiang Systematic Detection of Capability Leaks in Stock Android Smartphones. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Yanbin Lu Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Max Schuchard, Christopher Thompson 0002, Nicholas Hopper, Yongdae Kim Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Denis Foo Kune, John Kölndorfer, Nicholas Hopper, Yongdae Kim Location leaks over the GSM air interface. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Yajin Zhou, Zhi Wang 0004, Wu Zhou 0001, Xuxian Jiang Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Gabi Nakibly, Alex Kirshon, Dima Gonikman, Dan Boneh Persistent OSPF Attacks. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Zhuhua Cai, Chris Jermaine The Latent Community Model for Detecting Sybils in Social Networks. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Lei Liu 0021, Xinwen Zhang, Guanhua Yan, Songqing Chen Chrome Extensions: Threat Analysis and Countermeasures. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Jian Jiang, Jinjin Liang, Kang Li 0001, Jun Li 0001, Hai-Xin Duan, Jianping Wu Ghost Domain Names: Revoked Yet Still Resolvable. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Hui Xue 0007, Nathan Dautenhahn, Samuel T. King Using replicated execution for a more secure and reliable web browser. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Hongyu Gao, Yan Chen 0004, Kathy Lee, Diana Palsetia, Alok N. Choudhary Towards Online Spam Filtering in Social Networks. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Kenneth G. Paterson, Nadhem J. AlFardan Plaintext-Recovery Attacks Against Datagram TLS. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Jean-Pierre Hubaux Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Rob Jansen, Nicholas Hopper, Paul F. Syverson Throttling Tor Bandwidth Parasites. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer 0005, Ahmad-Reza Sadeghi, Bhargava Shastry Towards Taming Privilege-Escalation Attacks on Android. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Srinath T. V. Setty, Richard McPherson, Andrew J. Blumberg, Michael Walfish Making argument systems for outsourced computation practical (sometimes). Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Yan Huang 0001, David Evans 0001, Jonathan Katz Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Emily Stark 0001, Lin-Shung Huang, Dinesh Israni, Collin Jackson, Dan Boneh The Case for Prefetching and Prevalidating TLS Server Certificates. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Emil Stefanov, Elaine Shi, Dawn Xiaodong Song Towards Practical Oblivious RAM. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Kun Sun 0001, Jiang Wang 0008, Fengwei Zhang, Angelos Stavrou SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Zhiyun Qian, Zhaoguang Wang, Qiang Xu, Zhuoqing Morley Mao, Ming Zhang 0005, Yi-Min Wang You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Jignesh Patel, Alex X. Liu, Eric Torng Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1David Dewey, Jonathon T. Giffin Static detection of C++ vtable escape vulnerabilities in binary code. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Michael Backes 0001, Matteo Maffei, Kim Pecina Automated Synthesis of Secure Distributed Applications. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Yangyi Chen, Bo Peng, XiaoFeng Wang 0001, Haixu Tang Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Donghai Tian, Qiang Zeng 0001, Dinghao Wu, Peng Liu 0005, Changzhen Hu Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Adam Bates 0001, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach Accountable Wiretapping -or- I know they can hear you now. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012 Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Steve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun ANDaNA: Anonymous Named Data Networking Application. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Man Ho Au, Apu Kapadia, Willy Susilo BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Qiang Yan 0001, Jin Han, Yingjiu Li, Robert H. Deng On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Daniel Reynaud, Dawn Xiaodong Song, Thomas R. Magrino, Edward XueJun Wu, Eui Chul Richard Shin FreeMarket: Shopping for free in Android applications. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang, Heng Yin 0001 Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Yu-To Chen, Pierre Grinspan, Blake Livingston, Palash Nandy, Brian Palmer Abuse Detection and Prevention Systems at a Large Scale Video Sharing Website. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Claude Castelluccia, Markus Dürmuth, Daniele Perito Adaptive Password-Strength Meters from Markov Models. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Karim Eldefrawy, Gene Tsudik, Aurélien Francillon, Daniele Perito SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Sangho Lee 0001, Jong Kim 0001 WarningBird: Detecting Suspicious URLs in Twitter Stream. Search on Bibsonomy NDSS The full citation details ... 2012 DBLP  BibTeX  RDF
1Alana Libonati, Jonathan M. McCune, Michael K. Reiter Usability Testing a Malware-Resistant Input Mechanism. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, Dan Boneh Location Privacy via Private Proximity Testing. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1 Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011 Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva Tracker: Security and Privacy for RFID-based Supply Chains. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Scott E. Coull, Fabian Monrose, Michael D. Bailey On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Michael Backes 0001, Matteo Maffei, Kim Pecina A Security API for Distributed Social Networks. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Omid Fatemieh, Ali Farhadi, Ranveer Chandra, Carl A. Gunter Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Aurélien Francillon, Boris Danev, Srdjan Capkun Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Zhichun Li, Yi Tang 0002, Yinzhi Cao, Vaibhav Rastogi, Yan Chen 0004, Bin Liu 0001, Clint Sbisa WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Tobias Distler, Ivan Popov, Wolfgang Schröder-Preikschat, Hans P. Reiser, Rüdiger Kapitza SPARE: Replicas on Hold. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Elaine Shi, T.-H. Hubert Chan, Eleanor Gilbert Rieffel, Richard Chow, Dawn Song Privacy-Preserving Aggregation of Time-Series Data. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang 0001, Dongyan Xu, Xuxian Jiang SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna PiOS: Detecting Privacy Leaks in iOS Applications. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, Engin Kirda Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Yan Huang 0001, Lior Malka, David Evans 0001, Jonathan Katz Efficient Privacy-Preserving Biometric Identification. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Liang Cai, Kai Zeng 0001, Hao Chen 0003, Prasant Mohapatra Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Eric Chan-Tin, Nicholas Hopper Accurate and Provably Secure Latency Estimation with Treeple. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, David Brumley AEG: Automatic Exploit Generation. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Xiapu Luo, Peng Zhou 0002, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, Roberto Perdisci HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman Losing Control of the Internet: Using the Data Plane to Attack the Control Plane. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Amir Houmansadr, Nikita Borisov SWIRL: A Scalable Watermark to Detect Correlated Network Flows. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1JongHyup Lee, Thanassis Avgerinos, David Brumley TIE: Principled Reverse Engineering of Types in Binary Programs. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
Displaying result #801 - #900 of 1211 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license