TRACK ME IF YOU CAN: ON THE EFFECTIVENESS OF CONTEXT-BASED IDENTIFIER CHANGES IN DEPLOYED MOBILE NETWORKS

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (19. : 2012 : San Diego, Calif.) Network and Distributed System Security Symposium 2012 (NDSS '12)
1. Verfasser: Bindschaedler, Laurent (VerfasserIn)
Weitere Verfasser: Jadliwala, Murtuza (VerfasserIn), Bilogrevic, Igor (VerfasserIn), Aad, Imad (VerfasserIn), Ginzboorg, Philip (VerfasserIn), Niemi, Valtteri (VerfasserIn), Hubaux, Jean-Pierre (VerfasserIn)
Pages:2012
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
TOWARDS ONLINE SPAM FILTERING IN SOCIAL NETWORKS 2020 Gao, Hongyu
FREEMARKET: SHOPPING FOR FREE IN ANDROID APPLICATIONS 2020 Reynaud, Daniel
ON LIMITATIONS OF DESIGNING LEAKAGE-RESILIENT PASSWORD SYSTEMS: ATTACKS, PRINCIPALS AND USABILITY 2020 Yan, Qiang
SYSTEMATIC DETECTION OF CAPABILITY LEAKS IN STOCK ANDROID SMARTPHONES 2020 Grace, Michael
INSIGHTS INTO USER BEHAVIOR IN DEALING WITH INTERNET ATTACKS 2020 Onarlioglu, Kaan
PATHCUTTER: SEVERING THE SELF-PROPAGATION PATH OF XSS JAVASCRIPT WORMS IN SOCIAL WEB NETWORKS 2020 Cao, Yinzhi
KRUISER: SEMI-SYNCHRONIZED NON-BLOCKING CONCURRENT KERNEL HEAP BUFFER OVERFLOW MONITORING 2020 Tian, Donghai
SHORTMAC: EFFICIENT DATA-PLANE FAULT LOCALIZATION 2020 Zhang, Xin
PERSISTENT OSPF ATTACKS 2020 Nakibly, Gabi
YOU ARE WHAT YOU LIKE! INFORMATION LEAKAGE THROUGH USERS' INTERESTS 2020 Chaabane, Abdelberi
ANDANA: ANONYMOUS NAMED DATA NETWORKING APPLICATION 2020 Dibenedetto, Steven
X-VINE: SECURE AND PSEUDONYMOUS ROUTING IN DHTS USING SOCIAL NETWORKS 2020 Mittal, Prateek
TRACK ME IF YOU CAN: ON THE EFFECTIVENESS OF CONTEXT-BASED IDENTIFIER CHANGES IN DEPLOYED MOBILE NETWORKS 2020 Bindschaedler, Laurent
YOU CAN RUN, BUT YOU CAN'T HIDE: EXPOSING NETWORK LOCATION FOR TARGETED DOS ATTACKS IN CELLULAR NETWORKS 2020 Qian, Zhiyun
WEAPONIZING FEMTOCELLS: THE EFFECT OF ROGUE DEVICES ON MOBILE TELECOMMUNICATIONS 2020 Golde, Nico
MAKING ARGUMENT SYSTEMS FOR OUTSOURCED COMPUTATION PRACTICAL (SOMETIMES) 2020 Setty, Srinath
LARGE-SCALE PRIVACY-PRESERVING MAPPING OF HUMAN GENOMIC SEQUENCES ON HYBRID CLOUDS 2020 Chen, Yangyi
TOWARDS PRACTICAL OBLIVIOUS RAM 2020 Stefanov, Emil
DISTANCE HIJACKING ATTACKS ON DISTANCE BOUNDING PROTOCOLS 2020 Cremers, Cas
THROTTLING TOR BANDWIDTH PARASITES 2020 Jansen, Rob
Alle Artikel auflisten