|
Conferences in DBLP
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. [Citation Graph (, )][DBLP]
User-Centric Handling of Identity Agent Compromise. [Citation Graph (, )][DBLP]
The Coremelt Attack. [Citation Graph (, )][DBLP]
Type-Based Analysis of PIN Processing APIs. [Citation Graph (, )][DBLP]
Declassification with Explicit Reference Points. [Citation Graph (, )][DBLP]
Tracking Information Flow in Dynamic Tree Structures. [Citation Graph (, )][DBLP]
Lightweight Opportunistic Tunneling (LOT). [Citation Graph (, )][DBLP]
Hide and Seek in Time - Robust Covert Timing Channels. [Citation Graph (, )][DBLP]
Authentic Time-Stamps for Archival Storage. [Citation Graph (, )][DBLP]
Towards a Theory of Accountability and Audit. [Citation Graph (, )][DBLP]
Reliable Evidence: Auditability by Typing. [Citation Graph (, )][DBLP]
PCAL: Language Support for Proof-Carrying Authorization Systems. [Citation Graph (, )][DBLP]
ReFormat: Automatic Reverse Engineering of Encrypted Messages. [Citation Graph (, )][DBLP]
Protocol Normalization Using Attribute Grammars. [Citation Graph (, )][DBLP]
Automatically Generating Models for Botnet Detection. [Citation Graph (, )][DBLP]
Dynamic Enforcement of Abstract Separation of Duty Constraints. [Citation Graph (, )][DBLP]
Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. [Citation Graph (, )][DBLP]
Requirements and Protocols for Inference-Proof Interactions in Information Systems. [Citation Graph (, )][DBLP]
A Privacy Preservation Model for Facebook-Style Social Network Systems. [Citation Graph (, )][DBLP]
New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. [Citation Graph (, )][DBLP]
Secure Pseudonymous Channels. [Citation Graph (, )][DBLP]
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. [Citation Graph (, )][DBLP]
Content Delivery Networks: Protection or Threat? [Citation Graph (, )][DBLP]
Model-Checking DoS Amplification for VoIP Session Initiation. [Citation Graph (, )][DBLP]
The Wisdom of Crowds: Attacks and Optimal Constructions. [Citation Graph (, )][DBLP]
Secure Evaluation of Private Linear Branching Programs with Medical Applications. [Citation Graph (, )][DBLP]
Keep a Few: Outsourcing Data While Maintaining Confidentiality. [Citation Graph (, )][DBLP]
Data Structures with Unpredictable Timing. [Citation Graph (, )][DBLP]
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. [Citation Graph (, )][DBLP]
Corruption-Localizing Hashing. [Citation Graph (, )][DBLP]
Isolating JavaScript with Filters, Rewriting, and Wrappers. [Citation Graph (, )][DBLP]
An Effective Method for Combating Malicious Scripts Clickbots. [Citation Graph (, )][DBLP]
Client-Side Detection of XSS Worms by Monitoring Payload Propagation. [Citation Graph (, )][DBLP]
Formal Indistinguishability Extended to the Random Oracle Model. [Citation Graph (, )][DBLP]
Computationally Sound Analysis of a Probabilistic Contract Signing Protocol. [Citation Graph (, )][DBLP]
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. [Citation Graph (, )][DBLP]
A Generic Security API for Symmetric Key Management on Cryptographic Devices. [Citation Graph (, )][DBLP]
ID-Based Secure Distance Bounding and Localization. [Citation Graph (, )][DBLP]
Secure Ownership and Ownership Transfer in RFID Systems. [Citation Graph (, )][DBLP]
Cumulative Attestation Kernels for Embedded Systems. [Citation Graph (, )][DBLP]
Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries. [Citation Graph (, )][DBLP]
Set Covering Problems in Role-Based Access Control. [Citation Graph (, )][DBLP]
|