Conference on Computer and Communications Security
container_rau5643b7ncwvh74y6p64hntle
Showing first 25 out of 4,335 results
A decision procedure for the verification of security protocols with explicit destructors
St�phanie Delaune, Florent Jacquemard
2004
|
Conference on Computer and Communications Security
doi:10.1145/1030083.1030121 dblp:conf/ccs/DelauneJ04
On the protocol composition logic PCL
Cas Cremers
2008
|
Conference on Computer and Communications Security
doi:10.1145/1368310.1368324 dblp:conf/ccs/Cremers08
Sedic
Kehuan Zhang, Xiaoyong Zhou, Yangyi Chen, XiaoFeng Wang, Yaoping Ruan
2011
|
Conference on Computer and Communications Security
doi:10.1145/2046707.2046767 dblp:conf/ccs/ZhangZCWR11
Detecting Malicious Domains via Graph Inference
Pratyusa Manadhata, Sandeep Yadav, Prasad Rao, William Horne
2014
|
Conference on Computer and Communications Security
doi:10.1145/2666652.2666659 dblp:conf/ccs/ManadhataYRH14
Pong-cache poisoning in GUESS
Neil Daswani, Hector Garcia-Molina
2004
|
Conference on Computer and Communications Security
doi:10.1145/1030083.1030099 dblp:conf/ccs/DaswaniG04
Efficient pseudorandom functions from the decisional linear assumption and weaker variants
Allison B. Lewko, Brent Waters
2009
|
Conference on Computer and Communications Security
doi:10.1145/1653662.1653677 dblp:conf/ccs/LewkoW09
Conditionally secure secret sharing schemes with disenrollment capability
Chris Charnes, Josef Pieprzyk, Rei Safavi-Naini
1994
|
Conference on Computer and Communications Security
doi:10.1145/191177.191196 dblp:conf/ccs/CharnesPS94
Practical Detection of Entropy Loss in Pseudo-Random Number Generators
Felix Dörre, Vladimir Klebanov
2016
|
Conference on Computer and Communications Security
doi:10.1145/2976749.2978369 dblp:conf/ccs/DorreK16
Dynamic window based multihop authentication for WSN
Lan Yao, Zhiliang Yu, Tie Zhang, Fuxiang Gao
2010
|
Conference on Computer and Communications Security
doi:10.1145/1866307.1866417 dblp:conf/ccs/YaoYZG10
Mechanized Network Origin and Path Authenticity Proofs
Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig
2014
|
Conference on Computer and Communications Security
doi:10.1145/2660267.2660349 dblp:conf/ccs/ZhangJBKHP14
Fingerprinting websites using remote traffic analysis
Xun Gong, Negar Kiyavash, Nikita Borisov
2010
|
Conference on Computer and Communications Security
doi:10.1145/1866307.1866397 dblp:conf/ccs/GongKB10
A new on-line cash check scheme
Robert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair
1997
|
Conference on Computer and Communications Security
doi:10.1145/266420.266444 dblp:conf/ccs/DengHJN97
Short paper
Chaitrali Amrutkar, Patrick Traynor
2012
|
Conference on Computer and Communications Security
doi:10.1145/2381934.2381939 dblp:conf/ccs/AmrutkarT12
Trail of bytes
Srinivas Krishnan, Kevin Z. Snow, Fabian Monrose
2010
|
Conference on Computer and Communications Security
doi:10.1145/1866307.1866314 dblp:conf/ccs/KrishnanSM10
DEMO: An IDS framework for internet of things empowered by 6LoWPAN
Prabhakaran Kasinathan, Gianfranco Costamagna, Hussein Khaleel, Claudio Pastrone, Maurizio A. Spirito
2013
|
Conference on Computer and Communications Security
doi:10.1145/2508859.2512494 dblp:conf/ccs/KasinathanCKPS13
Code red worm propagation modeling and analysis
Cliff Changchun Zou, Weibo Gong, Don Towsley
2002
|
Conference on Computer and Communications Security
doi:10.1145/586110.586130 dblp:conf/ccs/ZouGT02
Secure PRNG seeding on commercial off-the-shelf microcontrollers
Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede
2013
|
Conference on Computer and Communications Security
doi:10.1145/2517300.2517306 dblp:conf/ccs/HerrewegeLSKV13
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Peng Liu, Wanyu Zang
2003
|
Conference on Computer and Communications Security
doi:10.1145/948109.948135 dblp:conf/ccs/LiuZ03
Fast Non-Malleable Commitments
Hai Brenner, Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald
2015
|
Conference on Computer and Communications Security
doi:10.1145/2810103.2813721 dblp:conf/ccs/BrennerGRRV15
Topic modeling of freelance job postings to monitor web service abuse
Do-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, Lawrence K. Saul
2011
|
Conference on Computer and Communications Security
doi:10.1145/2046684.2046687 dblp:conf/ccs/KimMVS11
An architecture for practical actively secure MPC with dishonest majority
Marcel Keller, Peter Scholl, Nigel P. Smart
2013
|
Conference on Computer and Communications Security
doi:10.1145/2508859.2516744 dblp:conf/ccs/KellerSS13
Identity-based encryption from algorithm to enterprise deployment
Guido Appenzeller
2005
|
Conference on Computer and Communications Security
doi:10.1145/1102120.1102174 dblp:conf/ccs/Appenzeller05
Formalizing GDOI group key management requirements in NPATRL
Catherine Meadows, Paul Syverson
2001
|
Conference on Computer and Communications Security
doi:10.1145/501983.502016 dblp:conf/ccs/MeadowsS01
POSTER
Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng
2014
|
Conference on Computer and Communications Security
doi:10.1145/2660267.2662379 dblp:conf/ccs/LiYLQZW14a
Several secure store and forward devices
David M. Goldschlag
1996
|
Conference on Computer and Communications Security
doi:10.1145/238168.238200 dblp:conf/ccs/Goldschlag96
« Previous
Showing results 0 — 25 out of 4,335 results
Next »