The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACM Conference on Computer and Communications Security"( http://dblp.L3S.de/Venues/ACM_Conference_on_Computer_and_Communications_Security )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ccs

Publication years (Num. hits)
1993 (31) 1994 (32) 1996 (21) 1997 (18) 1998 (19) 1999 (17) 2000 (33) 2001 (28) 2002 (28) 2003 (37) 2004 (37) 2005 (43) 2006 (40) 2007 (57) 2008 (53) 2009 (59) 2010 (99) 2011 (103) 2012 (113) 2013 (159) 2014 (171) 2015 (170) 2016 (197) 2017 (207) 2018 (152)
Publication types (Num. hits)
inproceedings(1899) proceedings(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1084 occurrences of 605 keywords

Results
Found 1924 publication records. Showing 1924 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Young-joo Shin, Hyung Chan Kim, Dokeun Kwon, Ji-Hoon Jeong, Junbeom Hur Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi Symbolic Proofs for Lattice-Based Cryptography. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Simone Aonzo, Alessio Merlo, Giulio Tavella, Yanick Fratantonio Phishing Attacks on Modern Android. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dongpeng Xu, Jiang Ming 0002, Yu Fu, Dinghao Wu VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Meisam Mohammady, Lingyu Wang 0001, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi Preserving Both Privacy and Utility in Network Trace Anonymization. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yan Shoshitaishvili, Mayur Naik FEAST'18 - 2018 Workshop on Forming an Ecosystem around Software Transformation. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee Enforcing Unique Code Target Property for Control-Flow Integrity. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David A. Basin, Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse, Vincent Stettler A Formal Analysis of 5G Authentication. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrew Ferraiuolo, Mark Zhao, Andrew C. Myers, G. Edward Suh HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo Result Pattern Hiding Searchable Encryption for Conjunctive Queries. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shai Halevi Advanced Cryptography: Promise and Challenges. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Edward J. Schwartz, Cory F. Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, Charles Hines Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer Block Oriented Programming: Automating Data-Only Attacks. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sahar Mazloom, S. Dov Gordon Secure Computation with Differentially Private Access Patterns. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Man Zhou, Qian Wang 0002, Jingxiao Yang, Qi Li 0002, Feng Xiao, Zhibo Wang, Xiaofeng Chen 0001 PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Véronique Cortier, Joseph Lallemand Voting: You Can't Have Privacy without Individual Verifiability. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Song, Heng Yin, Chang Liu 0021, Dawn Song DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal DiSE: Distributed Symmetric-key Encryption. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mauro Cherubini, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wenbo Ding, Hongxin Hu On the Safety of IoT Device Physical Interaction Control. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chip-Hong Chang, Jorge Guajardo, Daniel Holcomb, Francesco Regazzoni, Ulrich Rührmair ASHES 2018- Workshop on Attacks and Solutions in Hardware Security. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wenbo Guo, Dongliang Mu, Jun Xu 0024, Purui Su, Gang Wang 0011, Xinyu Xing LEMNA: Explaining Deep Learning based Security Applications. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wenwen Wang, Kangjie Lu, Pen-Chung Yew Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, Xinyan Xinyan Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anupam Das 0001, Gunes Acar, Nikita Borisov, Amogh Pradeep The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Iskander Sánchez-Rola, Igor Santos, Davide Balzarotti Clock Around the Clock: Time-Based Device Fingerprinting. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eyal Ronen, Kenneth G. Paterson, Adi Shamir Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sisi Duan, Michael K. Reiter, Haibin Zhang BEAT: Asynchronous BFT Made Practical. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haopei Wang, Guangliang Yang, Phakpoom Chinprutthiwong, Lei Xu, Yangyong Zhang, Guofei Gu Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kihong Heo, Woosuk Lee, Pardis Pashakhanloo, Mayur Naik Effective Program Debloating via Reinforcement Learning. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, Giovanni Vigna MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shaanan N. Cohney, Matthew D. Green, Nadia Heninger Practical State Recovery Attacks against Legacy RNG Implementations. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin R. B. Butler, Thomas Shrimpton, Doug Szajda, Patrick Traynor Mitigating Risk while Complying with Data Retention Laws. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michael Brenner 0003, Kurt Rohloff WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Battista Biggio, Fabio Roli Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Massimiliano Albanese, Dijiang Huang MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD). Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammed Abuhamad, Tamer AbuHmed, Aziz Mohaisen, DaeHun Nyang Large-Scale and Language-Oblivious Code Authorship Identification. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Carmine Abate, Arthur Azevedo de Amorim, Roberto Blanco, Ana Nora Evans, Guglielmo Fachini, Catalin Hritcu, Théo Laurent, Benjamin C. Pierce, Marco Stronati, Andrew Tolmach When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hao Chen 0030, Zhicong Huang, Kim Laine, Peter Rindal Labeled PSI from Fully Homomorphic Encryption with Malicious Security. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal MVG Mechanism: Differential Privacy under Matrix-Valued Query. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini Tiresias: Predicting Security Events Through Deep Learning. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jo Van Bulck, Frank Piessens, Raoul Strackx Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marc Andrysco, Andres Nötzli, Fraser Brown, Ranjit Jhala, Deian Stefan Towards Verified, Constant-time Floating Point Operations. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hyunwoo Yu, Jaemin Lim, Kiyeon Kim, Suk-Bok Lee Pinto: Enabling Video Privacy for Commodity IoT Cameras. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky Prime and Prejudice: Primality Testing Under Adversarial Conditions. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang 0002, Yuan Zhang 0009, Zhiyun Qian, Hai-Xin Duan How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fattaneh Bayatbabolghani, Marina Blanton Secure Multi-Party Computation. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Niklas Büscher, Daniel Demmler, Stefan Katzenbeisser 0001, David Kretzmer, Thomas Schneider 0003 HyCC: Compilation of Hybrid Protocols for Practical Secure Computation. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Roei Schuster, Vitaly Shmatikov, Eran Tromer Situational Access Control in the Internet of Things. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shuai Li, Huajun Guo, Nicholas Hopper Measuring Information Leakage in Website Fingerprinting Attacks and Defenses. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Vladimir Kolesnikov, Xiao Wang 0012 Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, Martin T. Vechev Securify: Practical Security Analysis of Smart Contracts. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhikun Zhang, Tianhao Wang 0001, Ninghui Li, Shibo He, Jiming Chen CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rob Jansen, Matthew Traudt, Nicholas Hopper Privacy-Preserving Dynamic Learning of Tor Network Traffic. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christopher Patton, Thomas Shrimpton Partially Specified Channels: The TLS 1.3 Record Layer without Elision. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Lie, Mohammad Mannan, Michael Backes 0001, XiaoFeng Wang 0001 (eds.) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018 Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  BibTeX  RDF
1Markus Brandt, Tianxiang Dai, Amit Klein, Haya Shulman, Michael Waidner Domain Validation++ For MitM-Resilient PKI. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jingxuan He, Pesho Ivanov, Petar Tsankov, Veselin Raychev, Martin T. Vechev Debin: Predicting Debug Information in Stripped Binaries. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Iulia Bastys, Musard Balliu, Andrei Sabelfeld If This Then What?: Controlling Flows in IoT Apps. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dan Meng SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mahdi Zamani, Mahnush Movahedi, Mariana Raykova 0001 RapidChain: Scaling Blockchain via Full Sharding. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Karan Ganju, Qi Wang, Wei Yang 0013, Carl A. Gunter, Nikita Borisov Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aaron Johnson, Ryan Henry 17th Workshop on Privacy in the Electronic Society (WPES 2018). Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn, Fuqiang Zhang vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hojoon Lee, Chihyun Song, Brent ByungHoon Kang Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yutao Tang, Ding Li, Zhichun Li, Mu Zhang 0001, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Benjamin Bichsel, Timon Gehr, Dana Drachsler-Cohen, Petar Tsankov, Martin T. Vechev DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhengxiong Li, Aditya Singh Rathore, Chen Song 0001, Sheng Wei 0004, Yanzhi Wang, Wenyao Xu PrinTracker: Fingerprinting 3D Printers using Commodity Scanners. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jiyeon Lee, Hayeon Kim, Junghwan Park, Insik Shin, Sooel Son Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaokui Shu, Frederico Araujo, Douglas Lee Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao Threat Intelligence Computing. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Toshinori Araki, Assi Barak, Jun Furukawa 0001, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida Generalizing the SPDZ Compiler For Other Protocols. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Steven Goldfeder Fast Multiparty Threshold ECDSA with Fast Trustless Setup. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Benjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates 0001, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi Cross-App Poisoning in Software-Defined Networking. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wissam Aoudi, Mikel Iturbe, Magnus Almgren Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Milad Nasr, Alireza Bahramali, Amir Houmansadr DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mehmet Emre Gursoy, Ling Liu 0001, Stacey Truex, Lei Yu, Wenqi Wei Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa M. Redmiles, Blase Ur "What was that site doing with my Facebook password?": Designing Password-Reuse Notifications. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee PASTA: PASsword-based Threshold Authentication. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eric Crockett, Chris Peikert, Chad Sharp ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jeremiah Blocki, Ling Ren 0001, Samson Zhou Bandwidth-Hard Functions: Reductions and Lower Bounds. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ruiyu Zhu, Darion Cassel, Amr Sabry, Yan Huang 0001 NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang 0006 Model-Reuse Attacks on Deep Learning Systems. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai Compressing Vector OLE. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nestor Hernandez, Mizanur Rahman, Ruben Recabarren, Bogdan Carbunar Fraud De-Anonymization for Fun and Profit. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu Secure Opportunistic Multipath Key Exchange. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas Schmitz, Maximilian Algehed, Cormac Flanagan, Alejandro Russo Faceted Secure Multi Execution. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Quan Chen, Alexandros Kapravelos Mystique: Uncovering Information Leakage from Browser Extensions. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Elissa M. Redmiles, Ziyun Zhu, Sean Kross, Dhruv Kuchhal, Tudor Dumitras, Michelle L. Mazurek Asking for a Friend: Evaluating Response Biases in Security User Studies. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Stefan Dziembowski, Lisa Eckey, Sebastian Faust FairSwap: How To Fairly Exchange Digital Goods. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaoqian Jiang, Miran Kim, Kristin E. Lauter, Yongsoo Song Secure Outsourced Matrix Computation and Application to Neural Networks. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sarvar Patel, Giuseppe Persiano, Kevin Yeo Private Stateful Information Retrieval. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat A Better Method to Analyze Blockchain Consistency. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1924 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license