The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2010 (conf/ccs/2010asia)

  1. Data protection in outsourcing scenarios: issues and directions. [Citation Graph (, )][DBLP]

  2. A lattice-based approach to mashup security. [Citation Graph (, )][DBLP]

  3. Towards publishing recommendation data with predictive anonymization. [Citation Graph (, )][DBLP]

  4. Restoring compromised privacy in micro-data disclosure. [Citation Graph (, )][DBLP]

  5. Securely outsourcing linear algebra computations. [Citation Graph (, )][DBLP]

  6. Attribute-based signature and its applications. [Citation Graph (, )][DBLP]

  7. Dynamic fully forward-secure group signatures. [Citation Graph (, )][DBLP]

  8. Identity-based encryption based on DHIES. [Citation Graph (, )][DBLP]

  9. Region-based BGP announcement filtering for improved BGP security. [Citation Graph (, )][DBLP]

  10. Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. [Citation Graph (, )][DBLP]

  11. Securing wireless sensor networks against large-scale node capture attacks. [Citation Graph (, )][DBLP]

  12. Preventing drive-by download via inter-module communication monitoring. [Citation Graph (, )][DBLP]

  13. A solution for the automated detection of clickjacking attacks. [Citation Graph (, )][DBLP]

  14. PAriCheck: an efficient pointer arithmetic checker for C programs. [Citation Graph (, )][DBLP]

  15. An opportunistic authority evaluation scheme for data security in crisis management scenarios. [Citation Graph (, )][DBLP]

  16. Effective trust management through a hybrid logical and relational approach. [Citation Graph (, )][DBLP]

  17. Toward practical authorization-dependent user obligation systems. [Citation Graph (, )][DBLP]

  18. Cap unification: application to protocol security modulo homomorphic encryption. [Citation Graph (, )][DBLP]

  19. SSLock: sustaining the trust on entities brought by SSL. [Citation Graph (, )][DBLP]

  20. Computationally secure two-round authenticated message exchange. [Citation Graph (, )][DBLP]

  21. Bureaucratic protocols for secure two-party sorting, selection, and permuting. [Citation Graph (, )][DBLP]

  22. A logic for authorization provenance. [Citation Graph (, )][DBLP]

  23. Risk-based access control systems built on fuzzy inferences. [Citation Graph (, )][DBLP]

  24. Attribute based data sharing with attribute revocation. [Citation Graph (, )][DBLP]

  25. binOb+: a framework for potent and stealthy binary obfuscation. [Citation Graph (, )][DBLP]

  26. Secure provenance: the essential of bread and butter of data forensics in cloud computing. [Citation Graph (, )][DBLP]

  27. RunTest: assuring integrity of dataflow processing in cloud computing infrastructures. [Citation Graph (, )][DBLP]

  28. K-anonymous association rule hiding. [Citation Graph (, )][DBLP]

  29. Controlling data disclosure in computational PIR protocols. [Citation Graph (, )][DBLP]

  30. Cryptographic role-based security mechanisms based on role-key hierarchy. [Citation Graph (, )][DBLP]

  31. PriMa: an effective privacy protection mechanism for social networks. [Citation Graph (, )][DBLP]

  32. Oblivious enforcement of hidden information release policies. [Citation Graph (, )][DBLP]

  33. Apex: extending Android permission model and enforcement with user-defined runtime constraints. [Citation Graph (, )][DBLP]

  34. A hotspot-based protocol for attack traceback in mobile ad hoc networks. [Citation Graph (, )][DBLP]

  35. Practical ID-based encryption for wireless sensor network. [Citation Graph (, )][DBLP]

  36. A game theoretic model for digital identity and trust in online communities. [Citation Graph (, )][DBLP]

  37. Scene tagging: image-based CAPTCHA using image composition and object relationships. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002