YOU CAN'T DO TODAY'S SECURITY WITH YESTERDAY'S METHODS

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (20. : 2013 : San Diego, Calif.) Network and Distributed System Security Symposium 2013 (NDSS '13) ; Volume 2 of 2
1. Verfasser: Sullivan, Joe (VerfasserIn)
Pages:2013
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
INTENTION AND ORIGINATION: AN INSIDE LOOK AT LARGE-SCALE BOT QUERIES 2020 Zhang, Junjie
I WANT MY VOICE TO BE HEARD: IP OVER VOICE-OVER-IP FOR UNOBSERVABLE CENSORSHIP CIRCUMVENTION 2020 Houmansadr, Amir
OIRS: OUTSOURCED IMAGE RECOVERY SERVICE FROM COMPRESSIVE SENSING WITH PRIVACY ASSURANCE 2020 Wang, Cong
A FORMAL FRAMEWORK FOR NETWORK SECURITY DESIGN SYNTHESIS 2020 Rahman, Mohammad
MACROECONOMIC ANALYSIS OF MALWARE 2020 Garg, Vaibhav
YOU CAN'T DO TODAY'S SECURITY WITH YESTERDAY'S METHODS 2020 Sullivan, Joe
ONE BAD APPLE: BACKWARDS COMPATIBILITY ATTACKS ON STATE-OF-THE-ART CRYPTOGRAPHY 2020 Jager, Tibor
CLEAR AND PRESENT DATA: OPAQUE TRAFFIC AND ITS SECURITY IMPLICATIONS FOR THE FUTURE 2020 White, A. M.
TOWARD ONLINE VERIFICATION OF CLIENT BEHAVIOR IN DISTRIBUTED APPLICATIONS 2020 Cochran, Robert A.
LOW-COST STANDARD SIGNATURES IN WIRELESS SENSOR NETWORKS: A CASE FOR REVIVING PRE-COMPUTATION TECHNIQUES? 2020 Ateniese, Giuseppe
JUICE: A LONGITUDINAL STUDY OF AN SEO CAMPAIGN 2020 Wang, David Y.
PRACTICAL TIMING SIDE CHANNEL ATTACKS AGAINST KERNEL SPACE ASLR 2020 Hund, Ralf
AUTOMATIC PROTOCOL SELECTION IN SECURE TWO-PARTY COMPUTATION? 2020 Kerschbaum, Florian
ASSESSING SOFTWARE INTEGRITY OF VIRTUAL APPLIANCES THROUGH SOFTWARE WHITELISTS: IS IT ANY GOOD? 2020 Huh, Jun Ho
OBLIVISTORE: HIGH PERFORMANCE OBLIVIOUS DISTRIBUTED CLOUD DATA STORE 2020 Stefanov, Emil
LIRA: LIGHTWEIGHT INCENTIVIZED ROUTING FOR ANONYMITY 2020 Jansen, Rob
DOES COUNTING STILL COUNT? REVISITING THE SECURITY OF COUNTING BASED USER AUTHENTICATION PROTOCOLS AGAINST STATISTICAL ATTACKS 2020 Asghar, Hassan Jameel
AUTOMATICALLY INFERRING THE EVOLUTION OF MALICIOUS ACTIVITY ON THE INTERNET 2020 Venkataraman, Shobha
DETECTION OF MALICIOUS PDF FILES BASED ON HIERARCHICAL DOCUMENT STRUCTURE 2020 Srndic, Nedim
CLICKONOMICS: DETERMINING THE EFFECT OF ANTI-PIRACY MEASURES FOR ONE-CLICK HOSTING 2020 Lauinger, Tobias
Alle Artikel auflisten