|
Conferences in DBLP
Attacking cryptographic schemes based on "perturbation polynomials". [Citation Graph (, )][DBLP]
Filter-resistant code injection on ARM. [Citation Graph (, )][DBLP]
False data injection attacks against state estimation in electric power grids. [Citation Graph (, )][DBLP]
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. [Citation Graph (, )][DBLP]
An efficient forward private RFID protocol. [Citation Graph (, )][DBLP]
RFID privacy: relation between two notions, minimal condition, and efficient construction. [Citation Graph (, )][DBLP]
CoSP: a general framework for computational soundness proofs. [Citation Graph (, )][DBLP]
Reactive noninterference. [Citation Graph (, )][DBLP]
Computational soundness for key exchange protocols with symmetric encryption. [Citation Graph (, )][DBLP]
A probabilistic approach to hybrid role mining. [Citation Graph (, )][DBLP]
Efficient pseudorandom functions from the decisional linear assumption and weaker variants. [Citation Graph (, )][DBLP]
Improving privacy and security in multi-authority attribute-based encryption. [Citation Graph (, )][DBLP]
Oblivious transfer with access control. [Citation Graph (, )][DBLP]
NISAN: network information service for anonymization networks. [Citation Graph (, )][DBLP]
Certificateless onion routing. [Citation Graph (, )][DBLP]
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. [Citation Graph (, )][DBLP]
Ripley: automatically securing web 2.0 applications through replicated execution. [Citation Graph (, )][DBLP]
HAIL: a high-availability and integrity layer for cloud storage. [Citation Graph (, )][DBLP]
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. [Citation Graph (, )][DBLP]
Dynamic provable data possession. [Citation Graph (, )][DBLP]
On cellular botnets: measuring the impact of malicious devices on a cellular network core. [Citation Graph (, )][DBLP]
On lightweight mobile phone application certification. [Citation Graph (, )][DBLP]
SMILE: encounter-based trust for mobile social services. [Citation Graph (, )][DBLP]
Battle of Botcraft: fighting bots in online games with human observational proofs. [Citation Graph (, )][DBLP]
Fides: remote anomaly-based cheat detection using client emulation. [Citation Graph (, )][DBLP]
Behavior based software theft detection. [Citation Graph (, )][DBLP]
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks. [Citation Graph (, )][DBLP]
Effective implementation of the cell broadband engineTM isolation loader. [Citation Graph (, )][DBLP]
On achieving good operating points on an ROC plane using stochastic anomaly score prediction. [Citation Graph (, )][DBLP]
On non-cooperative location privacy: a game-theoretic analysis. [Citation Graph (, )][DBLP]
Privacy-preserving genomic computation through program specialization. [Citation Graph (, )][DBLP]
Feeling-based location privacy protection for location-based services. [Citation Graph (, )][DBLP]
Multi-party off-the-record messaging. [Citation Graph (, )][DBLP]
The bayesian traffic analysis of mix networks. [Citation Graph (, )][DBLP]
As-awareness in Tor path selection. [Citation Graph (, )][DBLP]
Membership-concealing overlay networks. [Citation Graph (, )][DBLP]
On the difficulty of software-based attestation of embedded devices. [Citation Graph (, )][DBLP]
Proximity-based access control for implantable medical devices. [Citation Graph (, )][DBLP]
XCS: cross channel scripting and its impact on web applications. [Citation Graph (, )][DBLP]
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms. [Citation Graph (, )][DBLP]
Finding bugs in exceptional situations of JNI programs. [Citation Graph (, )][DBLP]
Secure open source collaboration: an empirical study of linus' law. [Citation Graph (, )][DBLP]
On voting machine design for verification and testability. [Citation Graph (, )][DBLP]
Secure in-VM monitoring using hardware virtualization. [Citation Graph (, )][DBLP]
A metadata calculus for secure information sharing. [Citation Graph (, )][DBLP]
Multiple password interference in text passwords and click-based graphical passwords. [Citation Graph (, )][DBLP]
Can they hear me now?: a security analysis of law enforcement wiretaps. [Citation Graph (, )][DBLP]
English shellcode. [Citation Graph (, )][DBLP]
Learning your identity and disease from research papers: information leaks in genome wide association study. [Citation Graph (, )][DBLP]
Countering kernel rootkits with lightweight hook protection. [Citation Graph (, )][DBLP]
Mapping kernel objects to enable systematic integrity checking. [Citation Graph (, )][DBLP]
Robust signatures for kernel data structures. [Citation Graph (, )][DBLP]
A new cell counter based attack against tor. [Citation Graph (, )][DBLP]
Scalable onion routing with torsk. [Citation Graph (, )][DBLP]
Anonymous credentials on a standard java card. [Citation Graph (, )][DBLP]
Large-scale malware indexing using function-call graphs. [Citation Graph (, )][DBLP]
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. [Citation Graph (, )][DBLP]
Your botnet is my botnet: analysis of a botnet takeover. [Citation Graph (, )][DBLP]
|