LOW-COST STANDARD SIGNATURES IN WIRELESS SENSOR NETWORKS: A CASE FOR REVIVING PRE-COMPUTATION TECHNIQUES?
|
2020 |
Ateniese, Giuseppe |
JUICE: A LONGITUDINAL STUDY OF AN SEO CAMPAIGN
|
2020 |
Wang, David Y. |
PRACTICAL TIMING SIDE CHANNEL ATTACKS AGAINST KERNEL SPACE ASLR
|
2020 |
Hund, Ralf |
AUTOMATIC PROTOCOL SELECTION IN SECURE TWO-PARTY COMPUTATION?
|
2020 |
Kerschbaum, Florian |
ASSESSING SOFTWARE INTEGRITY OF VIRTUAL APPLIANCES THROUGH SOFTWARE WHITELISTS: IS IT ANY GOOD?
|
2020 |
Huh, Jun Ho |
OBLIVISTORE: HIGH PERFORMANCE OBLIVIOUS DISTRIBUTED CLOUD DATA STORE
|
2020 |
Stefanov, Emil |
LIRA: LIGHTWEIGHT INCENTIVIZED ROUTING FOR ANONYMITY
|
2020 |
Jansen, Rob |
DOES COUNTING STILL COUNT? REVISITING THE SECURITY OF COUNTING BASED USER AUTHENTICATION PROTOCOLS AGAINST STATISTICAL ATTACKS
|
2020 |
Asghar, Hassan Jameel |
AUTOMATICALLY INFERRING THE EVOLUTION OF MALICIOUS ACTIVITY ON THE INTERNET
|
2020 |
Venkataraman, Shobha |
DETECTION OF MALICIOUS PDF FILES BASED ON HIERARCHICAL DOCUMENT STRUCTURE
|
2020 |
Srndic, Nedim |
CLICKONOMICS: DETERMINING THE EFFECT OF ANTI-PIRACY MEASURES FOR ONE-CLICK HOSTING
|
2020 |
Lauinger, Tobias |
FRESCO: MODULAR COMPOSABLE SECURITY SERVICES FOR SOFTWARE-DEFINED NETWORKS
|
2020 |
Shin, Seungwon |
HOW PRIVACY LEAKS FROM BLUETOOTH MOUSE?
|
2020 |
Pan, Xian |
UPDATES FROM THE INTERNET BACKBONE: AN RPKI/RTR ROUTER IMPLEMENTATION, MEASUREMENTS, AND ANALYSIS
|
2020 |
Wählisch, Matthias |
ONE (BLOCK) SIZE FITS ALL: PIR AND SPIR OVER ARBITRARY-LENGTH RECORDS VIA MULTI-BLOCK PIR QUERIES
|
2020 |
Henry, Ryan |
TAILING RFID TAGS FOR CLONE DETECTION
|
2020 |
Zanetti, Davide |
AN EMPIRICAL EVALUATION OF RELAY SELECTION IN TOR
|
2020 |
Wacek, Christopher |
ANALYZING UNIQUE-BID AUCTION SITES FOR FUN AND PROFIT
|
2020 |
Samorodnitzky, Ory |
BEHIND THE SCENES OF ONLINE ATTACKS: AN ANALYSIS OF EXPLOITATION BEHAVIORS ON THE WEB
|
2020 |
Canali, Davide |
PRIVACY-ENHANCING TECHNOLOGIES FOR MEDICAL TESTS USING GENOMIC DATA
|
2020 |
Ayday, Erman |