|
Conferences in DBLP
A New Framework for RFID Privacy. [Citation Graph (, )][DBLP]
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. [Citation Graph (, )][DBLP]
Privacy-Preserving, Taxable Bank Accounts. [Citation Graph (, )][DBLP]
Formal Analysis of Privacy for Vehicular Mix-Zones. [Citation Graph (, )][DBLP]
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. [Citation Graph (, )][DBLP]
A Theory of Runtime Enforcement, with Results. [Citation Graph (, )][DBLP]
Enforcing Secure Object Initialization in Java. [Citation Graph (, )][DBLP]
Flexible Scheduler-Independent Security. [Citation Graph (, )][DBLP]
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic. [Citation Graph (, )][DBLP]
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. [Citation Graph (, )][DBLP]
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. [Citation Graph (, )][DBLP]
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. [Citation Graph (, )][DBLP]
Website Fingerprinting and Identification Using Ordered Feature Sequences. [Citation Graph (, )][DBLP]
Web Browser History Detection as a Real-World Privacy Threat. [Citation Graph (, )][DBLP]
On the Secrecy of Spread-Spectrum Flow Watermarks. [Citation Graph (, )][DBLP]
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. [Citation Graph (, )][DBLP]
A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection. [Citation Graph (, )][DBLP]
Kamouflage: Loss-Resistant Password Management. [Citation Graph (, )][DBLP]
Sequential Protocol Composition in Maude-NPA. [Citation Graph (, )][DBLP]
Verifying Security Property of Peer-to-Peer Systems Using CSP. [Citation Graph (, )][DBLP]
Modeling and Analyzing Security in the Presence of Compromising Adversaries. [Citation Graph (, )][DBLP]
On Bounding Problems of Quantitative Information Flow. [Citation Graph (, )][DBLP]
On E-Vote Integrity in the Case of Malicious Voter Computers. [Citation Graph (, )][DBLP]
Election Verifiability in Electronic Voting Protocols. [Citation Graph (, )][DBLP]
Pretty Good Democracy for More Expressive Voting Schemes. [Citation Graph (, )][DBLP]
Efficient Multi-dimensional Key Management in Broadcast Services. [Citation Graph (, )][DBLP]
Caught in the Maze of Security Standards. [Citation Graph (, )][DBLP]
User-Role Reachability Analysis of Evolving Administrative Role Based Access Control. [Citation Graph (, )][DBLP]
An Authorization Framework Resilient to Policy Evaluation Failures. [Citation Graph (, )][DBLP]
Optimistic Fair Exchange with Multiple Arbiters. [Citation Graph (, )][DBLP]
Speaker Recognition in Encrypted Voice Streams. [Citation Graph (, )][DBLP]
Evaluating Adversarial Partitions. [Citation Graph (, )][DBLP]
Providing Mobile Users' Anonymity in Hybrid Networks. [Citation Graph (, )][DBLP]
Complexity of Anonymity for Security Protocols. [Citation Graph (, )][DBLP]
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. [Citation Graph (, )][DBLP]
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. [Citation Graph (, )][DBLP]
RatFish: A File Sharing Protocol Provably Secure against Rational Users. [Citation Graph (, )][DBLP]
A Service Dependency Model for Cost-Sensitive Intrusion Response. [Citation Graph (, )][DBLP]
Secure Code Update for Embedded Devices via Proofs of Secure Erasure. [Citation Graph (, )][DBLP]
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. [Citation Graph (, )][DBLP]
Low-Cost Client Puzzles Based on Modular Exponentiation. [Citation Graph (, )][DBLP]
Expressive, Efficient and Obfuscation Resilient Behavior Based IDS. [Citation Graph (, )][DBLP]
|