![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 193 matches
- 2023
- Mohamed Alqadhi
, Mohammed Alkinoon
, Jie Lin
, Ahmed Abdalaal
, David Mohaisen
:
Entangled Clouds: Measuring the Hosting Infrastructure of the Free Contents Web. CCSW@CCS 2023: 75-87 - Dominique Dittert
, Thomas Schneider
, Amos Treiber
:
Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search. CCSW@CCS 2023: 3-15 - Christian Ellerhold
, Johann Schnagl
, Thomas Schreck
:
Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification. CCSW@CCS 2023: 17-29 - Christian Göth
, Sebastian Ramacher
, Daniel Slamanig
, Christoph Striecks
, Erkan Tairi
, Alexander Zikulnig
:
Optimizing 0-RTT Key Exchange with Full Forward Security. CCSW@CCS 2023: 55-68 - David Hasselquist
, Niklas Johansson
, Niklas Carlsson
:
Now is the Time: Scalable and Cloud-supported Audio Conferencing using End-to-End Homomorphic Encryption. CCSW@CCS 2023: 41-53 - Matija Kupresanin
, Pavle Subotic
:
Ambit: Verification of Azure RBAC. CCSW@CCS 2023: 31-40 - Adi Offer
, Aviram Zilberman
, Asaf Shabtai
, Yuval Elovici
, Rami Puzis
:
CDGeB: Cloud Data Geolocation Benchmark. CCSW@CCS 2023: 69-74 - Mehdi B. Tahoori
:
Security Challenges and Opportunities of Cloud FPGAs. CCSW@CCS 2023: 1 - Francesco Regazzoni, Apostolos P. Fournaris:
Proceedings of the 2023 on Cloud Computing Security Workshop, CCSW 2023, Copenhagen, Denmark, 26 November 2023. ACM 2023 [contents] - 2022
- Roberto Avanzi:
Cryptographic Protection of Random Access Memory: How Inconspicuous can Hardening Against the most Powerful Adversaries be? CCSW 2022: 1 - Aydin Aysu:
Multi-Tenant Cloud FPGAs: Side-Channel Security and Safety. CCSW 2022: 7-8 - Rosario Cammarota:
Intel HERACLES: Homomorphic Encryption Revolutionary Accelerator with Correctness for Learning-oriented End-to-End Solutions. CCSW 2022: 3 - Thijs van Ede, Niek Khasuntsev, Bas Steen, Andrea Continella
:
Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies. CCSW 2022: 63-74 - Sana Habib, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé:
Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore. CCSW 2022: 23-39 - Asbat El Khairi, Marco Caselli, Christian Knierim, Andreas Peter, Andrea Continella
:
Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection. CCSW 2022: 9-21 - Thomas Lorünser
, Florian Wohner, Stephan Krenn:
A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic Management. CCSW 2022: 41-51 - Panagiotis Rizomiliotis, Aikaterini Triakosia:
On Matrix Multiplication with Homomorphic Encryption. CCSW 2022: 53-61 - Haibin Zhang:
Byzantine Fault Tolerance in the Age of Blockchains and Cloud Computing. CCSW 2022: 5 - Francesco Regazzoni, Marten van Dijk:
Proceedings of the 2022 on Cloud Computing Security Workshop, CCSW 2022, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9875-6 [contents] - 2021
- Pedro Antonino
, Wojciech Aleksander Woloszyn, A. W. Roscoe:
Guardian: Symbolic Validation of Orderliness in SGX Enclaves. CCSW 2021: 111-123 - Sepideh Avizheh, Preston Haffey, Reihaneh Safavi-Naini:
Privacy-enhanced OptiSwap. CCSW 2021: 39-57 - Christian Banse:
Data Sovereignty in the Cloud - Wishful Thinking or Reality? CCSW 2021: 153-154 - Osman Biçer, Burcu Yildiz, Alptekin Küpçü
:
m-Stability: Threshold Security Meets Transferable Utility. CCSW 2021: 73-82 - Claudio Canella, Mario Werner, Daniel Gruss, Michael Schwarz:
Automating Seccomp Filter Generation for Linux Applications. CCSW 2021: 139-151 - Srdjan Capkun, Ercan Ozturk, Gene Tsudik, Karl Wüst:
ROSEN: RObust and SElective Non-repudiation (for TLS). CCSW 2021: 97-109 - Xiaoqi Duan, Vipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song:
ACCO: Algebraic Computation with Comparison. CCSW 2021: 21-38 - Guofei Gu:
Programmable Security in the Age of Software-Defined Infrastructure. CCSW 2021: 1 - Orran Krieger:
Security in a Cloud Bazaar. CCSW 2021: 71-72 - Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos:
Private Hierarchical Clustering and Efficient Approximation. CCSW 2021: 3-20 - Mahnush Movahedi, Benjamin M. Case, James Honaker, Andrew Knox, Li Li, Yiming Paul Li, Sanjay Saravanan, Shubho Sengupta, Erik Taubeneck:
Privacy-Preserving Randomized Controlled Trials: A Protocol for Industry Scale Deployment. CCSW 2021: 59-69
skipping 163 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-17 11:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint