16th CCS 2009: Chicago, Illinois, USA

Refine list

showing all ?? records

Attacks I


Formal techniques

Applied cryptography

Anonymization networks

Cloud security

Security of mobile services

Software security using behavior

Systems and networks


Anonymization techniques

Embedded and mobile devices

Technique for ensuring software security

Designing secure systems

Attacks II

System security


Malware and bots

a service of  Schloss Dagstuhl - Leibniz Center for Informatics