Search dblp for Publications

export results for "toc:db/conf/ccs/asiaccs2007.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/ArdittiBBG07,
  author       = {David Arditti and
                  C{\^{o}}me Berbain and
                  Olivier Billet and
                  Henri Gilbert},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Compact {FPGA} implementations of {QUAD}},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {347--349},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229323},
  doi          = {10.1145/1229285.1229323},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ArdittiBBG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtallahBF07,
  author       = {Mikhail J. Atallah and
                  Marina Blanton and
                  Keith B. Frikken},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Efficient techniques for realizing geo-spatial access control},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {82--92},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229301},
  doi          = {10.1145/1229285.1229301},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtallahBF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AyyagariMLLL07,
  author       = {Padmapriya Ayyagari and
                  Prasenjit Mitra and
                  Dongwon Lee and
                  Peng Liu and
                  Wang{-}Chien Lee},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Incremental adaptation of XPath access control views},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229303},
  doi          = {10.1145/1229285.1229303},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AyyagariMLLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaekSZ07,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Jianying Zhou},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {New constructions of fuzzy identity-based encryption},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {368--370},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229330},
  doi          = {10.1145/1229285.1229330},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BaekSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalasubramanianBCCG07,
  author       = {Meenakshi Balasubramanian and
                  Abhishek Bhatnagar and
                  Namit Chaturvedi and
                  Atish Datta Chowdhury and
                  Arul Ganesh},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {A framework for decentralized access control},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {93--104},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229302},
  doi          = {10.1145/1229285.1229302},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BalasubramanianBCCG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasinOS07,
  author       = {David A. Basin and
                  Ernst{-}R{\"{u}}diger Olderog and
                  Paul E. Sevin{\c{c}}},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Specifying and analyzing security automata using {CSP-OZ}},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {70--81},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229299},
  doi          = {10.1145/1229285.1229299},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BasinOS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Bregman07,
  author       = {Mark Bregman},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Keynote speech},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229287},
  doi          = {10.1145/1229285.1229287},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Bregman07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BuhanDHV07,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Raymond N. J. Veldhuis},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Fuzzy extractors for continuous distributions},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {353--355},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229325},
  doi          = {10.1145/1229285.1229325},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BuhanDHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CookKY07,
  author       = {Debra L. Cook and
                  Angelos D. Keromytis and
                  Moti Yung},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Elastic block ciphers: the basic design},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {350--352},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229324},
  doi          = {10.1145/1229285.1229324},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CookKY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DekkerCCE07,
  author       = {M. A. C. Dekker and
                  J. G. Cederquist and
                  Jason Crampton and
                  Sandro Etalle},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Extended privilege inheritance in {RBAC}},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {383--385},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229335},
  doi          = {10.1145/1229285.1229335},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DekkerCCE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Gligor07,
  author       = {Virgil D. Gligor},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {On the evolution of adversary models in security protocols: from the
                  beginning to sensor networks},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229289},
  doi          = {10.1145/1229285.1229289},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Gligor07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrossschadlST07,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Alexander Szekely and
                  Stefan Tillich},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {The energy cost of cryptographic key establishment in wireless sensor
                  networks},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {380--382},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229334},
  doi          = {10.1145/1229285.1229334},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GrossschadlST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Hirohisa07,
  author       = {Hioki Hirohisa},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Crocus: a steganographic filesystem manager},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {344--346},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229322},
  doi          = {10.1145/1229285.1229322},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Hirohisa07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Jajodia07,
  author       = {Sushil Jajodia},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Topological analysis of network attack vulnerability},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229288},
  doi          = {10.1145/1229285.1229288},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Jajodia07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiangSL07,
  author       = {Cheng{-}Huang Jiang and
                  Shiuhpyng Shieh and
                  Jen{-}Chien Liu},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Keystroke statistical learning model for web authentication},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {359--361},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229327},
  doi          = {10.1145/1229285.1229327},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JiangSL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KubiakKZ07,
  author       = {Przemyslaw Kubiak and
                  Miroslaw Kutylowski and
                  Filip Zag{\'{o}}rski},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Kleptographic attacks on a cascade of mix servers},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {57--62},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229297},
  doi          = {10.1145/1229285.1229297},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KubiakKZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeBM07,
  author       = {Tri Van Le and
                  Mike Burmester and
                  Breno de Medeiros},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Universally composable and forward-secure {RFID} authentication and
                  authenticated key exchange},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {242--252},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229319},
  doi          = {10.1145/1229285.1229319},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeBM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeeKHP07,
  author       = {Heejo Lee and
                  Minjin Kwon and
                  Geoffrey Hasker and
                  Adrian Perrig},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {{BASE:} an incrementally deployable mechanism for viable {IP} spoofing
                  prevention},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {20--31},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229293},
  doi          = {10.1145/1229285.1229293},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeeKHP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiD07,
  author       = {Yingjiu Li and
                  Xuhua Ding},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Protecting {RFID} communications in supply chains},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {234--241},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229318},
  doi          = {10.1145/1229285.1229318},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiFGC07,
  author       = {Yang Li and
                  Binxing Fang and
                  Li Guo and
                  You Chen},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Network anomaly detection based on {TCM-KNN} algorithm},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {13--19},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229292},
  doi          = {10.1145/1229285.1229292},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiFGC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiM07,
  author       = {Ninghui Li and
                  Ziqing Mao},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Administration in role-based access control},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {127--138},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229305},
  doi          = {10.1145/1229285.1229305},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NguyenDRHL07,
  author       = {Lynette Qu Nguyen and
                  Tufan Demir and
                  Jeff Rowe and
                  Francis Hsu and
                  Karl N. Levitt},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {A framework for diversifying windows native APIs to tolerate code
                  injection attacks},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {392--394},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229338},
  doi          = {10.1145/1229285.1229338},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NguyenDRHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NguyenT07,
  author       = {Anh{-}Quynh Nguyen and
                  Yoshiyasu Takefuji},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {A novel approach for a file-system integrity monitor tool of Xen virtual
                  machine},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {194--202},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229313},
  doi          = {10.1145/1229285.1229313},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NguyenT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PangHM07,
  author       = {Chaoyi Pang and
                  David P. Hansen and
                  Anthony J. Maeder},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Managing {RBAC} states with transitive relations},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {139--148},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229306},
  doi          = {10.1145/1229285.1229306},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PangHM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ParkR07,
  author       = {Tae{-}Kyou Park and
                  Ilkyeun Ra},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {{SPECS:} smart partial enciphering service for accessing encrypted
                  files with efficient and transparent},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {377--379},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229333},
  doi          = {10.1145/1229285.1229333},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ParkR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PatilMM07,
  author       = {Vishwas Patil and
                  Alessandro Mei and
                  Luigi V. Mancini},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Addressing interoperability issues in access control models},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {389--391},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229337},
  doi          = {10.1145/1229285.1229337},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PatilMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ReidNTS07,
  author       = {Jason Reid and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Tee Tang and
                  Bouchra Senadji},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Detecting relay attacks with timing-based protocols},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {204--213},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229314},
  doi          = {10.1145/1229285.1229314},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ReidNTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RoderTE07,
  author       = {Patrick R{\"{o}}der and
                  Omid Tafreschi and
                  Claudia Eckert},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {History-based access control for {XML} documents},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {386--388},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229336},
  doi          = {10.1145/1229285.1229336},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RoderTE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Safavi-NainiWD07,
  author       = {Reihaneh Safavi{-}Naini and
                  Shuhong Wang and
                  Yvo Desmedt},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Unconditionally secure ring authentication},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {173--181},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229310},
  doi          = {10.1145/1229285.1229310},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Safavi-NainiWD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Schwan07,
  author       = {Matthias Schwan},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {An extended model of security policy for multi-applicative smart cards},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {226--233},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229316},
  doi          = {10.1145/1229285.1229316},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Schwan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SeoC07,
  author       = {Jeongseok Seo and
                  Sung Deok Cha},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Masquerade detection based on {SVM} and sequence-based user commands
                  profile},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {398--400},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229340},
  doi          = {10.1145/1229285.1229340},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SeoC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShahandashtiSB07,
  author       = {Siamak Fayyaz Shahandashti and
                  Reihaneh Safavi{-}Naini and
                  Joonsang Baek},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Concurrently-secure credential ownership proofs},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {161--172},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229309},
  doi          = {10.1145/1229285.1229309},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShahandashtiSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShenQ07,
  author       = {Jianjun Shen and
                  Sihan Qing},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {A dynamic information flow model of secure systems},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {341--343},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229321},
  doi          = {10.1145/1229285.1229321},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShenQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TeoA07,
  author       = {Lawrence Teo and
                  Gail{-}Joon Ahn},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Managing heterogeneous network environments using an extensible policy
                  framework},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {362--364},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229328},
  doi          = {10.1145/1229285.1229328},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TeoA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThingSD07,
  author       = {Vrizlynn L. L. Thing and
                  Morris Sloman and
                  Naranker Dulay},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Non-intrusive {IP} traceback for DDoS attacks},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {371--373},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229331},
  doi          = {10.1145/1229285.1229331},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ThingSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TonienSW07,
  author       = {Dongvu Tonien and
                  Reihaneh Safavi{-}Naini and
                  Peter R. Wild},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Combinatorial characterizations of authentication codes in verification
                  oracle model},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {183--193},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229311},
  doi          = {10.1145/1229285.1229311},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TonienSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TsengWL07,
  author       = {Chinyang Henry Tseng and
                  Shiau{-}Huey Wang and
                  Karl N. Levitt},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {{DRETA:} distributed routing evidence tracing and authentication intrusion
                  detection model for {MANET}},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {395--397},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229339},
  doi          = {10.1145/1229285.1229339},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TsengWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VimercatiJPS07,
  author       = {Sabrina De Capitani di Vimercati and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Trust management services in relational databases},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {149--160},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229308},
  doi          = {10.1145/1229285.1229308},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/VimercatiJPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangL07,
  author       = {Qihua Wang and
                  Ninghui Li},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Direct static enforcement of high-level security policies},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {214--225},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229315},
  doi          = {10.1145/1229285.1229315},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangNR07,
  author       = {Pan Wang and
                  Peng Ning and
                  Douglas S. Reeves},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {A \emph{k}-anonymous communication protocol for overlay networks},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229296},
  doi          = {10.1145/1229285.1229296},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangNR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Wei07,
  author       = {Victor K. Wei},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Invisible designated confirmer signatures without random oracles},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {356--358},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229326},
  doi          = {10.1145/1229285.1229326},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Wei07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuY07,
  author       = {Xiaoxin Wu and
                  David K. Y. Yau},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Mitigating denial-of-service attacks in {MANET} by distributed packet
                  filtering: a game-theoretic approach},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {365--367},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229329},
  doi          = {10.1145/1229285.1229329},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WuY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YanFCHEV07,
  author       = {Guanhua Yan and
                  Hector D. Flores and
                  Leticia Cuellar and
                  Nicolas W. Hengartner and
                  Stephan J. Eidenbenz and
                  Vincent Q. Vu},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Bluetooth worm propagation: mobility pattern matters!},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {32--44},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229294},
  doi          = {10.1145/1229285.1229294},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YanFCHEV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YoneyamaO07,
  author       = {Kazuki Yoneyama and
                  Kazuo Ohta},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Ring signatures: universally composable definitions and constructions},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {374--376},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229332},
  doi          = {10.1145/1229285.1229332},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YoneyamaO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuLP07,
  author       = {Yu Yu and
                  Jussipekka Leiwo and
                  A. Benjamin Premkumar},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Private stateful circuits secure against probing attacks},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {63--69},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229298},
  doi          = {10.1145/1229285.1229298},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YuLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangCCS07,
  author       = {Xinwen Zhang and
                  Michael J. Covington and
                  Songqing Chen and
                  Ravi S. Sandhu},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {SecureBus: towards application-transparent trusted computing with
                  mandatory access control},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {117--126},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229304},
  doi          = {10.1145/1229285.1229304},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangCCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangRNI07,
  author       = {Qinghua Zhang and
                  Douglas S. Reeves and
                  Peng Ning and
                  S. Purushothaman Iyer},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Analyzing network traffic to detect self-decrypting exploit code},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {4--12},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229291},
  doi          = {10.1145/1229285.1229291},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangRNI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007asia,
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {1-59593-574-6},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2007asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}