The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2007 (conf/ccs/2007)

  1. Assurance and evaluation: what next? [Citation Graph (, )][DBLP]

  2. An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. [Citation Graph (, )][DBLP]

  3. CANDID: preventing sql injection attacks using dynamic candidate evaluations. [Citation Graph (, )][DBLP]

  4. Multi-module vulnerability analysis of web-based applications. [Citation Graph (, )][DBLP]

  5. Do background images improve "draw a secret" graphical passwords? [Citation Graph (, )][DBLP]

  6. Beamauth: two-factor web authentication with a bookmark. [Citation Graph (, )][DBLP]

  7. Dynamic pharming attacks and locked same-origin policies for web browsers. [Citation Graph (, )][DBLP]

  8. Blacklistable anonymous credentials: blocking misbehaving users without ttps. [Citation Graph (, )][DBLP]

  9. How much anonymity does network latency leak? [Citation Graph (, )][DBLP]

  10. Denial of service or denial of security? [Citation Graph (, )][DBLP]

  11. Automated detection of persistent kernel control-flow attacks. [Citation Graph (, )][DBLP]

  12. Panorama: capturing system-wide information flow for malware detection and analysis. [Citation Graph (, )][DBLP]

  13. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. [Citation Graph (, )][DBLP]

  14. Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. [Citation Graph (, )][DBLP]

  15. Highly efficient techniques for network forensics. [Citation Graph (, )][DBLP]

  16. Preserving privacy in gps traces via uncertainty-aware path cloaking. [Citation Graph (, )][DBLP]

  17. Robust computational secret sharing and a unified account of classical secret-sharing goals. [Citation Graph (, )][DBLP]

  18. Chosen-ciphertext secure proxy re-encryption. [Citation Graph (, )][DBLP]

  19. Attribute-based encryption with non-monotonic access structures. [Citation Graph (, )][DBLP]

  20. Optimal security hardening using multi-objective optimization on attack tree models of networks. [Citation Graph (, )][DBLP]

  21. On the accuracy of decentralized virtual coordinate systems in adversarial networks. [Citation Graph (, )][DBLP]

  22. Analyzing the vulnerability of superpeer networks against attack. [Citation Graph (, )][DBLP]

  23. Towards automated provisioning of secure virtualized networks. [Citation Graph (, )][DBLP]

  24. Split-ballot voting: everlasting privacy with distributed trust. [Citation Graph (, )][DBLP]

  25. An independent audit framework for software dependent voting systems. [Citation Graph (, )][DBLP]

  26. Forward-secure signatures in untrusted update environments: efficient and generic constructions. [Citation Graph (, )][DBLP]

  27. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. [Citation Graph (, )][DBLP]

  28. An information-theoretic model for adaptive side-channel attacks. [Citation Graph (, )][DBLP]

  29. Covert channels in privacy-preserving identification systems. [Citation Graph (, )][DBLP]

  30. Detecting covert timing channels: an entropy-based approach. [Citation Graph (, )][DBLP]

  31. Polyglot: automatic extraction of protocol message format using dynamic binary analysis. [Citation Graph (, )][DBLP]

  32. Harvesting verifiable challenges from oblivious online sources. [Citation Graph (, )][DBLP]

  33. Filtering spam with behavioral blacklisting. [Citation Graph (, )][DBLP]

  34. ConceptDoppler: a weather tracker for internet censorship. [Citation Graph (, )][DBLP]

  35. Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. [Citation Graph (, )][DBLP]

  36. An inquiry into the nature and causes of the wealth of internet miscreants. [Citation Graph (, )][DBLP]

  37. Hardware-rooted trust for secure key management and transient trust. [Citation Graph (, )][DBLP]

  38. Robust key generation from signal envelopes in wireless networks. [Citation Graph (, )][DBLP]

  39. Robust group key agreement using short broadcasts. [Citation Graph (, )][DBLP]

  40. Protecting browsers from dns rebinding attacks. [Citation Graph (, )][DBLP]

  41. Alpaca: extensible authorization for distributed services. [Citation Graph (, )][DBLP]

  42. Efficient policy analysis for administrative role based access control. [Citation Graph (, )][DBLP]

  43. Provably secure ciphertext policy ABE. [Citation Graph (, )][DBLP]

  44. Security under key-dependent inputs. [Citation Graph (, )][DBLP]

  45. Cryptanalysis of the windows random number generator. [Citation Graph (, )][DBLP]

  46. Secure two-party k-means clustering. [Citation Graph (, )][DBLP]

  47. Privacy-preserving remote diagnostics. [Citation Graph (, )][DBLP]

  48. Automaton segmentation: a new approach to preserve privacy in xml information brokering. [Citation Graph (, )][DBLP]

  49. Privacy preserving error resilient dna searching through oblivious automata. [Citation Graph (, )][DBLP]

  50. Predicting vulnerable software components. [Citation Graph (, )][DBLP]

  51. On the infeasibility of modeling polymorphic shellcode. [Citation Graph (, )][DBLP]

  52. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). [Citation Graph (, )][DBLP]

  53. Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. [Citation Graph (, )][DBLP]

  54. Information disclosure under realistic assumptions: privacy versus optimality. [Citation Graph (, )][DBLP]

  55. Pors: proofs of retrievability for large files. [Citation Graph (, )][DBLP]

  56. Provable data possession at untrusted stores. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002