The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2008 (conf/ccs/2008)

  1. The good, the bad, and the provable. [Citation Graph (, )][DBLP]

  2. Spamalytics: an empirical analysis of spam marketing conversion. [Citation Graph (, )][DBLP]

  3. Code injection attacks on harvard-architecture devices. [Citation Graph (, )][DBLP]

  4. When good instructions go bad: generalizing return-oriented programming to RISC. [Citation Graph (, )][DBLP]

  5. Efficient and extensible security enforcement using dynamic data flow analysis. [Citation Graph (, )][DBLP]

  6. Ether: malware analysis via hardware virtualization extensions. [Citation Graph (, )][DBLP]

  7. Extending logical attack graphs for efficient vulnerability analysis. [Citation Graph (, )][DBLP]

  8. Robust defenses for cross-site request forgery. [Citation Graph (, )][DBLP]

  9. SOMA: mutual approval for included content in web pages. [Citation Graph (, )][DBLP]

  10. OMash: enabling secure web mashups via object abstractions. [Citation Graph (, )][DBLP]

  11. Computational soundness of observational equivalence. [Citation Graph (, )][DBLP]

  12. Unbounded verification, falsification, and characterization of security protocols by pattern refinement. [Citation Graph (, )][DBLP]

  13. Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. [Citation Graph (, )][DBLP]

  14. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. [Citation Graph (, )][DBLP]

  15. Location privacy of distance bounding protocols. [Citation Graph (, )][DBLP]

  16. Verifiable functional purity in java. [Citation Graph (, )][DBLP]

  17. Trust management for secure information flows. [Citation Graph (, )][DBLP]

  18. Mitigating DNS DoS attacks. [Citation Graph (, )][DBLP]

  19. Revocation games in ephemeral networks. [Citation Graph (, )][DBLP]

  20. Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. [Citation Graph (, )][DBLP]

  21. Enforcing authorization policies using transactional memory introspection. [Citation Graph (, )][DBLP]

  22. Towards practical biometric key generation with randomized biometric templates. [Citation Graph (, )][DBLP]

  23. Towards automatic reverse engineering of software security configurations. [Citation Graph (, )][DBLP]

  24. FairplayMP: a system for secure multi-party computation. [Citation Graph (, )][DBLP]

  25. Information leaks in structured peer-to-peer anonymous communication systems. [Citation Graph (, )][DBLP]

  26. Privacy oracle: a system for finding application leaks with black box differential testing. [Citation Graph (, )][DBLP]

  27. A formal framework for reflective database access control policies. [Citation Graph (, )][DBLP]

  28. A class of probabilistic models for role engineering. [Citation Graph (, )][DBLP]

  29. Assessing query privileges via safe and efficient permission composition. [Citation Graph (, )][DBLP]

  30. Dependent link padding algorithms for low latency anonymity systems. [Citation Graph (, )][DBLP]

  31. PEREA: towards practical TTP-free revocation in anonymous authentication. [Citation Graph (, )][DBLP]

  32. Efficient attributes for anonymous credentials. [Citation Graph (, )][DBLP]

  33. Type-checking zero-knowledge. [Citation Graph (, )][DBLP]

  34. Towards automated proofs for asymmetric encryption schemes in the random oracle model. [Citation Graph (, )][DBLP]

  35. EON: modeling and analyzing dynamic access control systems with logic programs. [Citation Graph (, )][DBLP]

  36. Tupni: automatic reverse engineering of input formats. [Citation Graph (, )][DBLP]

  37. Rootkit-resistant disks. [Citation Graph (, )][DBLP]

  38. Identity-based encryption with efficient revocation. [Citation Graph (, )][DBLP]

  39. Black-box accountable authority identity-based encryption. [Citation Graph (, )][DBLP]

  40. Authenticated hash tables. [Citation Graph (, )][DBLP]

  41. Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. [Citation Graph (, )][DBLP]

  42. Cryptographically verified implementations for TLS. [Citation Graph (, )][DBLP]

  43. Reconsidering physical key secrecy: teleduplication via optical decoding. [Citation Graph (, )][DBLP]

  44. RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. [Citation Graph (, )][DBLP]

  45. Constructions of truly practical secure protocols using standardsmartcards. [Citation Graph (, )][DBLP]

  46. Traitor tracing with constant size ciphertext. [Citation Graph (, )][DBLP]

  47. Multi-use unidirectional proxy re-signatures. [Citation Graph (, )][DBLP]

  48. Efficient security primitives derived from a secure aggregation algorithm. [Citation Graph (, )][DBLP]

  49. Machine learning attacks against the Asirra CAPTCHA. [Citation Graph (, )][DBLP]

  50. A low-cost attack on a Microsoft captcha. [Citation Graph (, )][DBLP]

  51. BootJacker: compromising computers using forced restarts. [Citation Graph (, )][DBLP]

  52. A look in the mirror: attacks on package managers. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002