|
Conferences in DBLP
Assurance and evaluation: what next? [Citation Graph (, )][DBLP]
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. [Citation Graph (, )][DBLP]
CANDID: preventing sql injection attacks using dynamic candidate evaluations. [Citation Graph (, )][DBLP]
Multi-module vulnerability analysis of web-based applications. [Citation Graph (, )][DBLP]
Do background images improve "draw a secret" graphical passwords? [Citation Graph (, )][DBLP]
Beamauth: two-factor web authentication with a bookmark. [Citation Graph (, )][DBLP]
Dynamic pharming attacks and locked same-origin policies for web browsers. [Citation Graph (, )][DBLP]
Blacklistable anonymous credentials: blocking misbehaving users without ttps. [Citation Graph (, )][DBLP]
How much anonymity does network latency leak? [Citation Graph (, )][DBLP]
Denial of service or denial of security? [Citation Graph (, )][DBLP]
Automated detection of persistent kernel control-flow attacks. [Citation Graph (, )][DBLP]
Panorama: capturing system-wide information flow for malware detection and analysis. [Citation Graph (, )][DBLP]
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. [Citation Graph (, )][DBLP]
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. [Citation Graph (, )][DBLP]
Highly efficient techniques for network forensics. [Citation Graph (, )][DBLP]
Preserving privacy in gps traces via uncertainty-aware path cloaking. [Citation Graph (, )][DBLP]
Robust computational secret sharing and a unified account of classical secret-sharing goals. [Citation Graph (, )][DBLP]
Chosen-ciphertext secure proxy re-encryption. [Citation Graph (, )][DBLP]
Attribute-based encryption with non-monotonic access structures. [Citation Graph (, )][DBLP]
Optimal security hardening using multi-objective optimization on attack tree models of networks. [Citation Graph (, )][DBLP]
On the accuracy of decentralized virtual coordinate systems in adversarial networks. [Citation Graph (, )][DBLP]
Analyzing the vulnerability of superpeer networks against attack. [Citation Graph (, )][DBLP]
Towards automated provisioning of secure virtualized networks. [Citation Graph (, )][DBLP]
Split-ballot voting: everlasting privacy with distributed trust. [Citation Graph (, )][DBLP]
An independent audit framework for software dependent voting systems. [Citation Graph (, )][DBLP]
Forward-secure signatures in untrusted update environments: efficient and generic constructions. [Citation Graph (, )][DBLP]
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. [Citation Graph (, )][DBLP]
An information-theoretic model for adaptive side-channel attacks. [Citation Graph (, )][DBLP]
Covert channels in privacy-preserving identification systems. [Citation Graph (, )][DBLP]
Detecting covert timing channels: an entropy-based approach. [Citation Graph (, )][DBLP]
Polyglot: automatic extraction of protocol message format using dynamic binary analysis. [Citation Graph (, )][DBLP]
Harvesting verifiable challenges from oblivious online sources. [Citation Graph (, )][DBLP]
Filtering spam with behavioral blacklisting. [Citation Graph (, )][DBLP]
ConceptDoppler: a weather tracker for internet censorship. [Citation Graph (, )][DBLP]
Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. [Citation Graph (, )][DBLP]
An inquiry into the nature and causes of the wealth of internet miscreants. [Citation Graph (, )][DBLP]
Hardware-rooted trust for secure key management and transient trust. [Citation Graph (, )][DBLP]
Robust key generation from signal envelopes in wireless networks. [Citation Graph (, )][DBLP]
Robust group key agreement using short broadcasts. [Citation Graph (, )][DBLP]
Protecting browsers from dns rebinding attacks. [Citation Graph (, )][DBLP]
Alpaca: extensible authorization for distributed services. [Citation Graph (, )][DBLP]
Efficient policy analysis for administrative role based access control. [Citation Graph (, )][DBLP]
Provably secure ciphertext policy ABE. [Citation Graph (, )][DBLP]
Security under key-dependent inputs. [Citation Graph (, )][DBLP]
Cryptanalysis of the windows random number generator. [Citation Graph (, )][DBLP]
Secure two-party k-means clustering. [Citation Graph (, )][DBLP]
Privacy-preserving remote diagnostics. [Citation Graph (, )][DBLP]
Automaton segmentation: a new approach to preserve privacy in xml information brokering. [Citation Graph (, )][DBLP]
Privacy preserving error resilient dna searching through oblivious automata. [Citation Graph (, )][DBLP]
Predicting vulnerable software components. [Citation Graph (, )][DBLP]
On the infeasibility of modeling polymorphic shellcode. [Citation Graph (, )][DBLP]
The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). [Citation Graph (, )][DBLP]
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. [Citation Graph (, )][DBLP]
Information disclosure under realistic assumptions: privacy versus optimality. [Citation Graph (, )][DBLP]
Pors: proofs of retrievability for large files. [Citation Graph (, )][DBLP]
Provable data possession at untrusted stores. [Citation Graph (, )][DBLP]
|