Bulwark: Holistic and Verified Security Monitoring of Web Protocols
|
2020 |
Veronese, Lorenzo |
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing
|
2020 |
Agrawal, Shweta |
Designing Reverse Firewalls for the Real World
|
2020 |
Bossuat, Angele |
Dynamic and Secure Memory Transformation in Userspace
|
2020 |
Lyerly, Robert |
Zipper Stack: Shadow Stacks Without Shadow
|
2020 |
Li, Jinfeng |
An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference
|
2020 |
Shen, Liyan |
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation . Camtepe
|
2020 |
Sultan, Nazatul Haque |
Secure Cloud Auditing with Efficient Ownership Transfer
|
2020 |
Shen, Jun |
Encrypt-to-Self: Securely Outsourcing Storage
|
2020 |
Pijnenburg, Jeroen |
GDPR - Challenges for Reconciling Legal Rules with Technical Reality
|
2020 |
Kutylowski, Mirosiaw |
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment
|
2020 |
Ning, Jianting |
Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds
|
2020 |
You, Weijing |
Anonymity Preserving Byzantine Vector Consensus
|
2020 |
Cachin, Christian |
Understanding the Security Risks of Docker Hub
|
2020 |
Liu, Peiyu |
Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems
|
2020 |
Zhang, Yihe |
Polisma - A Framework for Learning Attribute-Based Access Control Policies
|
2020 |
Jabal, Amani Abu |
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage
|
2020 |
Cardaioli, Matteo |
Distributed Detection of APTs: Consensus vs. Clustering
|
2020 |
Rubio, Juan E. |
Follow the Blue Bird: A Study on Threat Data Published on Twitter
|
2020 |
Alves, Fernando |
DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon
|
2020 |
Conti, Mauro |