default search action
ACM Transactions on Privacy and Security, Volume 20
Volume 20, Number 1, February 2017
- Stephanos Matsumoto, Raphael M. Reischuk, Pawel Szalachowski, Tiffany Hyun-Jin Kim, Adrian Perrig:
Authentication Challenges in a Global Environment. 1:1-1:34 - Isabel Wagner:
Evaluating the Strength of Genomic Privacy Metrics. 2:1-2:34 - Mathias Humbert, Erman Ayday, Jean-Pierre Hubaux, Amalio Telenti:
Quantifying Interdependent Risks in Genomic Privacy. 3:1-3:31
Volume 20, Number 2, May 2017
- Alessandro Checco, Giuseppe Bianchi, Douglas J. Leith:
BLC: Private Matrix Factorization Recommenders via Automatic Group Learning. 4:1-4:25 - Leon J. Osterweil, Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Sean Peisert:
Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example. 5:1-5:31 - Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Pulse-Response: Exploring Human Body Impedance for Biometric Recognition. 6:1-6:31
Volume 20, Number 3, August 2017
- Job Noorman, Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens, Pieter Maene, Bart Preneel, Ingrid Verbauwhede, Johannes Götzfried, Tilo Müller, Felix C. Freiling:
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. 7:1-7:33 - Marcus Brandenburger, Christian Cachin, Nikola Knezevic:
Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores. 8:1-8:30 - Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns. 9:1-9:29 - Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu:
Efficient Attack Graph Analysis through Approximate Inference. 10:1-10:30 - Bradley Reaves, Jasmine D. Bowers, Nolen Scaife, Adam Bates, Arnav Bhartiya, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications. 11:1-11:31
Volume 20, Number 4, October 2017
- Xiaokui Shu, Danfeng (Daphne) Yao, Naren Ramakrishnan, Trent Jaeger:
Long-Span Program Behavior Modeling and Attack Detection. 12:1-12:28 - Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Measuring, Characterizing, and Detecting Facebook Like Farms. 13:1-13:28 - Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, Vinod Vaikuntanathan:
Fast Proxy Re-Encryption for Publish/Subscribe Systems. 14:1-14:31 - Antonino Rullo, Daniele Midi, Edoardo Serra, Elisa Bertino:
Pareto Optimal Security Resource Allocation for Internet of Things. 15:1-15:30 - Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Min Lyu, Hongxia Jin:
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization. 16:1-16:33
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.