|
Conferences in DBLP
File System Design with Assured Delete. [Citation Graph (, )][DBLP]
On the Practicality of Private Information Retrieval. [Citation Graph (, )][DBLP]
Cryptographic Methods for Storing Ballots on a Voting Machine. [Citation Graph (, )][DBLP]
Army of Botnets. [Citation Graph (, )][DBLP]
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. [Citation Graph (, )][DBLP]
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing. [Citation Graph (, )][DBLP]
Attribute-Based Publishing with Hidden Credentials and Hidden Policies. [Citation Graph (, )][DBLP]
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. [Citation Graph (, )][DBLP]
Shedding Light on the Configuration of Dark Addresses. [Citation Graph (, )][DBLP]
Consumable Credentials in Linear-Logic-Based Access-Control Systems. [Citation Graph (, )][DBLP]
Fig: Automatic Fingerprint Generation. [Citation Graph (, )][DBLP]
OPTWALL: A Hierarchical Traffic-Aware Firewall. [Citation Graph (, )][DBLP]
RICH: Automatically Protecting Against Integer-Based Vulnerabilities. [Citation Graph (, )][DBLP]
Generic Application-Level Protocol Analyzer and its Language. [Citation Graph (, )][DBLP]
A Quantitative Study of Forum Spamming Using Context-based Analysis. [Citation Graph (, )][DBLP]
Secret Handshakes with Dynamic and Fuzzy Matching. [Citation Graph (, )][DBLP]
Phinding Phish: An Evaluation of Anti-Phishing Toolbars. [Citation Graph (, )][DBLP]
|