WEB PKI: CLOSING THE GAP BETWEEN GUIDELINES AND PRACTICES

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (21. : 2014 : San Diego, Calif.) Network and Distributed System Security Symposium 2014 (NDSS '14)
1. Verfasser: Delignat-Lavaud, Antoine (VerfasserIn)
Weitere Verfasser: Abadi, Martin (VerfasserIn), Birrell, Andrew (VerfasserIn), Mironov, Ilya (VerfasserIn), Wobber, Ted (VerfasserIn), Xie, Yinglian (VerfasserIn)
Pages:2014
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
GAINING CONTROL OF CELLULAR TRAFFIC ACCOUNTING BY SPURIOUS TCP RETRANSMISSION 2020 Go, Younghwan
CYBERPROBE: TOWARDS INTERNET-SCALE ACTIVE DETECTION OF MALICIOUS SERVERS 2020 Nappa, Antonio
SCREENMILKER: HOW TO MILK YOUR ANDROID SCREEN FOR SECRETS 2020 Lin, Chia-Chi
SIMULATION OF BUILT-IN PHP FEATURES FOR PRECISE STATIC CODE ANALYSIS 2020 Dahse, Johannes
ENHANCED CERTIFICATE TRANSPARENCY AND END-TO-END ENCRYPTED MAIL 2020 Ryan, Mark D.
ON SEMANTIC PATTERNS OF PASSWORDS AND THEIR SECURITY IMPACT 2020 Veras, Rafael
PRACTICAL DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL LEAKAGE 2020 Stefanov, Emil
AUTHENTICATION USING PULSE-RESPONSE BIOMETRICS 2020 Rasmussen, Kasper B.
NAZCA: DETECTING MALWARE DISTRIBUTION IN LARGE-SCALE NETWORKS 2020 Invernizzi, Luca
EXECUTE THIS! ANALYZING UNSAFE AND MALICIOUS DYNAMIC CODE LOADING IN ANDROID APPLICATIONS 2020 Poeplau, Sebastian
EFFICIENT PRIVATE FILE RETRIEVAL BY COMBINING ORAM AND PIR 2020 Mayberry, Travis
NO DIRECTION HOME: THE TRUE COST OF ROUTING AROUND DECOYS 2020 Houmansadr, Amir
HYBRID-BRIDGE: EFFICIENTLY BRIDGING THE SEMANTIC-GAP IN VMI VIA DECOUPLED EXECUTION AND TRAINING MEMOIZATION 2020 Saberi, Alireza
ACCELPRINT: IMPERFECTIONS OF ACCELEROMETERS MAKE SMARTPHONES TRACKABLE 2020 Dey, Sanorita
PRIVACY-PRESERVING DISTRIBUTED STREAM MONITORING 2020 Friedman, Arik
THE TANGLED WEB OF PASSWORD REUSE 2020 Das, Anupam
SELLING OFF USER PRIVACY AT AUCTION 2020 Castelluccia, Claude
COPKER: COMPUTING WITH PRIVATE KEYS WITHOUT RAM 2020 Guan, Le
POWER ATTACK: AN INCREASING THREAT TO DATA CENTERS 2020 Xu, Zhang
SCAMBAITER: UNDERSTANDING TARGETED NIGERIAN SCAMS ON CRAIGSLIST 2020 Park, Youngsam
Alle Artikel auflisten