The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2009 (conf/ccs/2009asia)


  1. Securing virtual machine monitors: what is needed? [Citation Graph (, )][DBLP]


  2. Automatic discovery of botnet communities on large-scale communication networks. [Citation Graph (, )][DBLP]


  3. Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners. [Citation Graph (, )][DBLP]


  4. Automating analysis of large-scale botnet probing events. [Citation Graph (, )][DBLP]


  5. Towards complete node enumeration in a peer-to-peer botnet. [Citation Graph (, )][DBLP]


  6. Efficient IRM enforcement of history-based access control policies. [Citation Graph (, )][DBLP]


  7. Lightweight self-protecting JavaScript. [Citation Graph (, )][DBLP]


  8. On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. [Citation Graph (, )][DBLP]


  9. A generic construction of useful client puzzles. [Citation Graph (, )][DBLP]


  10. An integrated approach to detection of fast and slow scanning worms. [Citation Graph (, )][DBLP]


  11. Authenticated wireless roaming via tunnels: making mobile guests feel at home. [Citation Graph (, )][DBLP]


  12. On-board credentials with open provisioning. [Citation Graph (, )][DBLP]


  13. Flexible muTPMs through disembedding. [Citation Graph (, )][DBLP]


  14. A chipset level network backdoor: bypassing host-based firewall & IDS. [Citation Graph (, )][DBLP]


  15. TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay. [Citation Graph (, )][DBLP]


  16. Universally composable contributory group key exchange. [Citation Graph (, )][DBLP]


  17. Universal forgery of the identity-based sequential aggregate signature scheme. [Citation Graph (, )][DBLP]


  18. Partnership in key exchange protocols. [Citation Graph (, )][DBLP]


  19. Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary. [Citation Graph (, )][DBLP]


  20. Formalizing information security knowledge. [Citation Graph (, )][DBLP]


  21. Efficient zero-knowledge identification schemes which respect privacy. [Citation Graph (, )][DBLP]


  22. Quantifying maximal loss of anonymity in protocols. [Citation Graph (, )][DBLP]


  23. The union-split algorithm and cluster-based anonymization of social networks. [Citation Graph (, )][DBLP]


  24. Hidden credential retrieval from a reusable password. [Citation Graph (, )][DBLP]


  25. Expressive policy analysis with enhanced system dynamicity. [Citation Graph (, )][DBLP]


  26. Semantic context aware security policy deployment. [Citation Graph (, )][DBLP]


  27. PBES: a policy based encryption system with application to data sharing in the power grid. [Citation Graph (, )][DBLP]


  28. Attribute based proxy re-encryption with delegating capabilities. [Citation Graph (, )][DBLP]


  29. Confidentiality-preserving distributed proofs of conjunctive queries. [Citation Graph (, )][DBLP]


  30. D-algebra for composing access control policy decisions. [Citation Graph (, )][DBLP]


  31. Toward practical analysis for trust management policy. [Citation Graph (, )][DBLP]


  32. Conditional proxy re-encryption secure against chosen-ciphertext attack. [Citation Graph (, )][DBLP]


  33. An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. [Citation Graph (, )][DBLP]


  34. Provably secure and efficient bounded ciphertext policy attribute based encryption. [Citation Graph (, )][DBLP]


  35. A new hash family obtained by modifying the SHA-2 family. [Citation Graph (, )][DBLP]


  36. Logging key assurance indicators in business processes. [Citation Graph (, )][DBLP]


  37. Anonymous user communication for privacy protection in wireless metropolitan mesh networks. [Citation Graph (, )][DBLP]


  38. Delegate predicate encryption and its application to anonymous authentication. [Citation Graph (, )][DBLP]


  39. Improved searchable public key encryption with designated tester. [Citation Graph (, )][DBLP]


  40. A note on Cook's elastic block cipher. [Citation Graph (, )][DBLP]


  41. A conceptual framework for Group-Centric secure information sharing. [Citation Graph (, )][DBLP]


  42. Intrusion response cost assessment methodology. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002