The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2009 (conf/ccs/2009)

  1. Attacking cryptographic schemes based on "perturbation polynomials". [Citation Graph (, )][DBLP]

  2. Filter-resistant code injection on ARM. [Citation Graph (, )][DBLP]

  3. False data injection attacks against state estimation in electric power grids. [Citation Graph (, )][DBLP]

  4. EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. [Citation Graph (, )][DBLP]

  5. An efficient forward private RFID protocol. [Citation Graph (, )][DBLP]

  6. RFID privacy: relation between two notions, minimal condition, and efficient construction. [Citation Graph (, )][DBLP]

  7. CoSP: a general framework for computational soundness proofs. [Citation Graph (, )][DBLP]

  8. Reactive noninterference. [Citation Graph (, )][DBLP]

  9. Computational soundness for key exchange protocols with symmetric encryption. [Citation Graph (, )][DBLP]

  10. A probabilistic approach to hybrid role mining. [Citation Graph (, )][DBLP]

  11. Efficient pseudorandom functions from the decisional linear assumption and weaker variants. [Citation Graph (, )][DBLP]

  12. Improving privacy and security in multi-authority attribute-based encryption. [Citation Graph (, )][DBLP]

  13. Oblivious transfer with access control. [Citation Graph (, )][DBLP]

  14. NISAN: network information service for anonymization networks. [Citation Graph (, )][DBLP]

  15. Certificateless onion routing. [Citation Graph (, )][DBLP]

  16. ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. [Citation Graph (, )][DBLP]

  17. Ripley: automatically securing web 2.0 applications through replicated execution. [Citation Graph (, )][DBLP]

  18. HAIL: a high-availability and integrity layer for cloud storage. [Citation Graph (, )][DBLP]

  19. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. [Citation Graph (, )][DBLP]

  20. Dynamic provable data possession. [Citation Graph (, )][DBLP]

  21. On cellular botnets: measuring the impact of malicious devices on a cellular network core. [Citation Graph (, )][DBLP]

  22. On lightweight mobile phone application certification. [Citation Graph (, )][DBLP]

  23. SMILE: encounter-based trust for mobile social services. [Citation Graph (, )][DBLP]

  24. Battle of Botcraft: fighting bots in online games with human observational proofs. [Citation Graph (, )][DBLP]

  25. Fides: remote anomaly-based cheat detection using client emulation. [Citation Graph (, )][DBLP]

  26. Behavior based software theft detection. [Citation Graph (, )][DBLP]

  27. The fable of the bees: incentivizing robust revocation decision making in ad hoc networks. [Citation Graph (, )][DBLP]

  28. Effective implementation of the cell broadband engineTM isolation loader. [Citation Graph (, )][DBLP]

  29. On achieving good operating points on an ROC plane using stochastic anomaly score prediction. [Citation Graph (, )][DBLP]

  30. On non-cooperative location privacy: a game-theoretic analysis. [Citation Graph (, )][DBLP]

  31. Privacy-preserving genomic computation through program specialization. [Citation Graph (, )][DBLP]

  32. Feeling-based location privacy protection for location-based services. [Citation Graph (, )][DBLP]

  33. Multi-party off-the-record messaging. [Citation Graph (, )][DBLP]

  34. The bayesian traffic analysis of mix networks. [Citation Graph (, )][DBLP]

  35. As-awareness in Tor path selection. [Citation Graph (, )][DBLP]

  36. Membership-concealing overlay networks. [Citation Graph (, )][DBLP]

  37. On the difficulty of software-based attestation of embedded devices. [Citation Graph (, )][DBLP]

  38. Proximity-based access control for implantable medical devices. [Citation Graph (, )][DBLP]

  39. XCS: cross channel scripting and its impact on web applications. [Citation Graph (, )][DBLP]

  40. A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms. [Citation Graph (, )][DBLP]

  41. Finding bugs in exceptional situations of JNI programs. [Citation Graph (, )][DBLP]

  42. Secure open source collaboration: an empirical study of linus' law. [Citation Graph (, )][DBLP]

  43. On voting machine design for verification and testability. [Citation Graph (, )][DBLP]

  44. Secure in-VM monitoring using hardware virtualization. [Citation Graph (, )][DBLP]

  45. A metadata calculus for secure information sharing. [Citation Graph (, )][DBLP]

  46. Multiple password interference in text passwords and click-based graphical passwords. [Citation Graph (, )][DBLP]

  47. Can they hear me now?: a security analysis of law enforcement wiretaps. [Citation Graph (, )][DBLP]

  48. English shellcode. [Citation Graph (, )][DBLP]

  49. Learning your identity and disease from research papers: information leaks in genome wide association study. [Citation Graph (, )][DBLP]

  50. Countering kernel rootkits with lightweight hook protection. [Citation Graph (, )][DBLP]

  51. Mapping kernel objects to enable systematic integrity checking. [Citation Graph (, )][DBLP]

  52. Robust signatures for kernel data structures. [Citation Graph (, )][DBLP]

  53. A new cell counter based attack against tor. [Citation Graph (, )][DBLP]

  54. Scalable onion routing with torsk. [Citation Graph (, )][DBLP]

  55. Anonymous credentials on a standard java card. [Citation Graph (, )][DBLP]

  56. Large-scale malware indexing using function-call graphs. [Citation Graph (, )][DBLP]

  57. Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. [Citation Graph (, )][DBLP]

  58. Your botnet is my botnet: analysis of a botnet takeover. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002