The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACM Conference on Computer and Communications Security"( http://dblp.L3S.de/Venues/ACM_Conference_on_Computer_and_Communications_Security )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ccs

Publication years (Num. hits)
1993 (31) 1994 (32) 1996 (21) 1997 (18) 1998 (19) 1999 (17) 2000 (33) 2001 (28) 2002 (28) 2003 (37) 2004 (37) 2005 (43) 2006 (40) 2007 (57) 2008 (53) 2009 (59) 2010 (99) 2011 (103) 2012 (113) 2013 (159) 2014 (171) 2015 (170) 2016 (197) 2017 (207) 2018 (152)
Publication types (Num. hits)
inproceedings(1899) proceedings(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1084 occurrences of 605 keywords

Results
Found 1924 publication records. Showing 1924 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jeremiah Blocki, Ling Ren 0001, Samson Zhou Bandwidth-Hard Functions: Reductions and Lower Bounds. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo Result Pattern Hiding Searchable Encryption for Conjunctive Queries. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Meisam Mohammady, Lingyu Wang 0001, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi Preserving Both Privacy and Utility in Network Trace Anonymization. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Payman Mohassel, Peter Rindal ABY3: A Mixed Protocol Framework for Machine Learning. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates 0001, Olivier Hermant, David M. Eyers, Jean Bacon, Margo Seltzer Runtime Analysis of Whole-System Provenance. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Quanyan Zhu, Stefan Rass Game Theory Meets Network Security: A Tutorial. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao 0001, Gail-Joon Ahn AIM-SDN: Attacking Information Mismanagement in SDN-datastores. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu Secure Opportunistic Multipath Key Exchange. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hojoon Lee, Chihyun Song, Brent ByungHoon Kang Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini Tiresias: Predicting Security Events Through Deep Learning. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giorgi Maisuradze, Christian Rossow ret2spec: Speculative Execution Using Return Stack Buffers. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek TACHYON: Fast Signatures from Compact Knapsack. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa M. Redmiles, Blase Ur "What was that site doing with my Facebook password?": Designing Password-Reuse Notifications. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Stefan Savage Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi Fast Secure Computation for Small Population over the Internet. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rob Jansen, Matthew Traudt, Nicholas Hopper Privacy-Preserving Dynamic Learning of Tor Network Traffic. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chip-Hong Chang, Jorge Guajardo, Daniel Holcomb, Francesco Regazzoni, Ulrich Rührmair ASHES 2018- Workshop on Attacks and Solutions in Hardware Security. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Edward J. Schwartz, Cory F. Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, Charles Hines Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Man Zhou, Qian Wang 0002, Jingxiao Yang, Qi Li 0002, Feng Xiao, Zhibo Wang, Xiaofeng Chen 0001 PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eric Crockett, Chris Peikert, Chad Sharp ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Itay Tsabary, Ittay Eyal The Gap Game. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhikun Zhang, Tianhao Wang 0001, Ninghui Li, Shibo He, Jiming Chen CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig Investigating System Operators' Perspective on Security Misconfigurations. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li Precise Android API Protection Mapping Derivation and Reasoning. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mauro Cherubini, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Iulia Bastys, Musard Balliu, Andrei Sabelfeld If This Then What?: Controlling Flows in IoT Apps. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammad A. Islam 0001, Shaolei Ren Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Awais Rashid, Nils Ole Tippenhauer CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jiyeon Lee, Hayeon Kim, Junghwan Park, Insik Shin, Sooel Son Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Roei Schuster, Vitaly Shmatikov, Eran Tromer Situational Access Control in the Internet of Things. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal DiSE: Distributed Symmetric-key Encryption. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chris Chao-Chun Cheng, Chen Shi, Neil Zhenqiang Gong, Yong Guan EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhengxiong Li, Aditya Singh Rathore, Chen Song 0001, Sheng Wei 0004, Yanzhi Wang, Wenyao Xu PrinTracker: Fingerprinting 3D Printers using Commodity Scanners. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shuai Li, Huajun Guo, Nicholas Hopper Measuring Information Leakage in Website Fingerprinting Attacks and Defenses. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marcel Kneib, Christopher Huth Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hongxu Chen, Yinxing Xue, Yuekang Li, Bihuan Chen 0001, Xiaofei Xie, Xiuheng Wu, Yang Liu 0003 Hawkeye: Towards a Desired Directed Grey-box Fuzzer. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mahdi Zamani, Mahnush Movahedi, Mariana Raykova 0001 RapidChain: Scaling Blockchain via Full Sharding. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mathy Vanhoef, Frank Piessens Release the Kraken: New KRACKs in the 802.11 Standard. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hao Chen 0030, Zhicong Huang, Kim Laine, Peter Rindal Labeled PSI from Fully Homomorphic Encryption with Malicious Security. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Massimo Bartoletti, Roberto Zunino BitML: A Calculus for Bitcoin Smart Contracts. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee Enforcing Unique Code Target Property for Control-Flow Integrity. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee PASTA: PASsword-based Threshold Authentication. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dan Meng SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Toshinori Araki, Assi Barak, Jun Furukawa 0001, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida Generalizing the SPDZ Compiler For Other Protocols. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tibor Jager, Saqib A. Kakvi, Alexander May 0001 On the Security of the PKCS#1 v1.5 Signature Scheme. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Milad Nasr, Alireza Bahramali, Amir Houmansadr DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dongpeng Xu, Jiang Ming 0002, Yu Fu, Dinghao Wu VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin R. B. Butler, Thomas Shrimpton, Doug Szajda, Patrick Traynor Mitigating Risk while Complying with Data Retention Laws. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Song, Heng Yin, Chang Liu 0021, Dawn Song DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Binlin Cheng, Jiang Ming 0002, Jianming Fu, Guojun Peng, Ting Chen 0002, Xiaosong Zhang, Jean-Yves Marion Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zeyu Ding, Yuxin Wang, Guanhong Wang, Danfeng Zhang, Daniel Kifer Detecting Violations of Differential Privacy. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, Surya Nepal Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, Martin T. Vechev Securify: Practical Security Analysis of Smart Contracts. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal MVG Mechanism: Differential Privacy under Matrix-Valued Query. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sisi Duan, Michael K. Reiter, Haibin Zhang BEAT: Asynchronous BFT Made Practical. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Young-joo Shin, Hyung Chan Kim, Dokeun Kwon, Ji-Hoon Jeong, Junbeom Hur Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Helen Nissenbaum Achieving Meaningful Privacy in Digital Systems. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mário S. Alvim, Stéphanie Delaune PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Security. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Karan Ganju, Qi Wang, Wei Yang 0013, Carl A. Gunter, Nikita Borisov Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shai Halevi Advanced Cryptography: Promise and Challenges. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mehmet Emre Gursoy, Ling Liu 0001, Stacey Truex, Lei Yu, Wenqi Wei Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Quan Chen, Alexandros Kapravelos Mystique: Uncovering Information Leakage from Browser Extensions. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Simone Aonzo, Alessio Merlo, Giulio Tavella, Yanick Fratantonio Phishing Attacks on Modern Android. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lei Zhang, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian, Geng Hong, Yuan Zhang 0009, Min Yang 0002 Invetter: Locating Insecure Input Validations in Android Services. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh Rendered Insecure: GPU Side Channel Attacks are Practical. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nestor Hernandez, Mizanur Rahman, Ruben Recabarren, Bogdan Carbunar Fraud De-Anonymization for Fun and Profit. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anupam Das 0001, Gunes Acar, Nikita Borisov, Amogh Pradeep The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, Giovanni Vigna MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wenwen Wang, Kangjie Lu, Pen-Chung Yew Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili New Constructions for Forward and Backward Private Symmetric Searchable Encryption. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sadia Afroz, Battista Biggio, Yuval Elovici, David Freeman, Asaf Shabtai 11th International Workshop on Artificial Intelligence and Security (AISec 2018). Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas Schmitz, Maximilian Algehed, Cormac Flanagan, Alejandro Russo Faceted Secure Multi Execution. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Battista Biggio, Fabio Roli Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maximilian Golla, Markus Dürmuth On the Accuracy of Password Strength Meters. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Carmine Abate, Arthur Azevedo de Amorim, Roberto Blanco, Ana Nora Evans, Guglielmo Fachini, Catalin Hritcu, Théo Laurent, Benjamin C. Pierce, Marco Stronati, Andrew Tolmach When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shaanan N. Cohney, Matthew D. Green, Nadia Heninger Practical State Recovery Attacks against Legacy RNG Implementations. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Iskander Sánchez-Rola, Igor Santos, Davide Balzarotti Clock Around the Clock: Time-Based Device Fingerprinting. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Markus Brandt, Tianxiang Dai, Amit Klein, Haya Shulman, Michael Waidner Domain Validation++ For MitM-Resilient PKI. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Adi Akavia, Dan Feldman, Hayim Shaul Secure Search on Encrypted Data via Multi-Ring Sketch. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer Block Oriented Programming: Automating Data-Only Attacks. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Véronique Cortier, Joseph Lallemand Voting: You Can't Have Privacy without Individual Verifiability. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fattaneh Bayatbabolghani, Marina Blanton Secure Multi-Party Computation. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Milad Nasr, Reza Shokri, Amir Houmansadr Machine Learning with Membership Privacy using Adversarial Regularization. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ruiyu Zhu, Darion Cassel, Amr Sabry, Yan Huang 0001 NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrew Ferraiuolo, Mark Zhao, Andrew C. Myers, G. Edward Suh HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell, Ariel Nof Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kihong Heo, Woosuk Lee, Pardis Pashakhanloo, Mayur Naik Effective Program Debloating via Reinforcement Learning. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Zheng Wang Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Roger A. Hallman, Kim Laine, Wei Dai, Nicolas Gama, Alex J. Malozemoff, Yuriy Polyakov, Sergiu Carpov Building Applications with Homomorphic Encryption. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wenbo Ding, Hongxin Hu On the Safety of IoT Device Physical Interaction Control. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang 0002, Dawu Gu K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sarvar Patel, Giuseppe Persiano, Kevin Yeo Private Stateful Information Retrieval. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Lie, Mohammad Mannan, Michael Backes 0001, XiaoFeng Wang 0001 (eds.) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018 Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 1924 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license