Conferences in DBLP
The good, the bad, and the provable. [Citation Graph (, )][DBLP ] Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP ] Code injection attacks on harvard-architecture devices. [Citation Graph (, )][DBLP ] When good instructions go bad: generalizing return-oriented programming to RISC. [Citation Graph (, )][DBLP ] Efficient and extensible security enforcement using dynamic data flow analysis. [Citation Graph (, )][DBLP ] Ether: malware analysis via hardware virtualization extensions. [Citation Graph (, )][DBLP ] Extending logical attack graphs for efficient vulnerability analysis. [Citation Graph (, )][DBLP ] Robust defenses for cross-site request forgery. [Citation Graph (, )][DBLP ] SOMA: mutual approval for included content in web pages. [Citation Graph (, )][DBLP ] OMash: enabling secure web mashups via object abstractions. [Citation Graph (, )][DBLP ] Computational soundness of observational equivalence. [Citation Graph (, )][DBLP ] Unbounded verification, falsification, and characterization of security protocols by pattern refinement. [Citation Graph (, )][DBLP ] Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. [Citation Graph (, )][DBLP ] Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. [Citation Graph (, )][DBLP ] Location privacy of distance bounding protocols. [Citation Graph (, )][DBLP ] Verifiable functional purity in java. [Citation Graph (, )][DBLP ] Trust management for secure information flows. [Citation Graph (, )][DBLP ] Mitigating DNS DoS attacks. [Citation Graph (, )][DBLP ] Revocation games in ephemeral networks. [Citation Graph (, )][DBLP ] Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. [Citation Graph (, )][DBLP ] Enforcing authorization policies using transactional memory introspection. [Citation Graph (, )][DBLP ] Towards practical biometric key generation with randomized biometric templates. [Citation Graph (, )][DBLP ] Towards automatic reverse engineering of software security configurations. [Citation Graph (, )][DBLP ] FairplayMP: a system for secure multi-party computation. [Citation Graph (, )][DBLP ] Information leaks in structured peer-to-peer anonymous communication systems. [Citation Graph (, )][DBLP ] Privacy oracle: a system for finding application leaks with black box differential testing. [Citation Graph (, )][DBLP ] A formal framework for reflective database access control policies. [Citation Graph (, )][DBLP ] A class of probabilistic models for role engineering. [Citation Graph (, )][DBLP ] Assessing query privileges via safe and efficient permission composition. [Citation Graph (, )][DBLP ] Dependent link padding algorithms for low latency anonymity systems. [Citation Graph (, )][DBLP ] PEREA: towards practical TTP-free revocation in anonymous authentication. [Citation Graph (, )][DBLP ] Efficient attributes for anonymous credentials. [Citation Graph (, )][DBLP ] Type-checking zero-knowledge. [Citation Graph (, )][DBLP ] Towards automated proofs for asymmetric encryption schemes in the random oracle model. [Citation Graph (, )][DBLP ] EON: modeling and analyzing dynamic access control systems with logic programs. [Citation Graph (, )][DBLP ] Tupni: automatic reverse engineering of input formats. [Citation Graph (, )][DBLP ] Rootkit-resistant disks. [Citation Graph (, )][DBLP ] Identity-based encryption with efficient revocation. [Citation Graph (, )][DBLP ] Black-box accountable authority identity-based encryption. [Citation Graph (, )][DBLP ] Authenticated hash tables. [Citation Graph (, )][DBLP ] Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. [Citation Graph (, )][DBLP ] Cryptographically verified implementations for TLS. [Citation Graph (, )][DBLP ] Reconsidering physical key secrecy: teleduplication via optical decoding. [Citation Graph (, )][DBLP ] RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. [Citation Graph (, )][DBLP ] Constructions of truly practical secure protocols using standardsmartcards. [Citation Graph (, )][DBLP ] Traitor tracing with constant size ciphertext. [Citation Graph (, )][DBLP ] Multi-use unidirectional proxy re-signatures. [Citation Graph (, )][DBLP ] Efficient security primitives derived from a secure aggregation algorithm. [Citation Graph (, )][DBLP ] Machine learning attacks against the Asirra CAPTCHA. [Citation Graph (, )][DBLP ] A low-cost attack on a Microsoft captcha. [Citation Graph (, )][DBLP ] BootJacker: compromising computers using forced restarts. [Citation Graph (, )][DBLP ] A look in the mirror: attacks on package managers. [Citation Graph (, )][DBLP ]