Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 171 matches
- 2014
- Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, Claudia Díaz:
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild. CCS 2014: 674-689 - Gail-Joon Ahn, Anupam Datta:
WPES 2014: 13th Workshop on Privacy in the Electronic Society. CCS 2014: 1546-1547 - Ehab Al-Shaer, Krishna Kant:
Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and Automation. CCS 2014: 1544-1545 - Prabhanjan Vijendra Ananth, Divya Gupta, Yuval Ishai, Amit Sahai:
Optimizing Obfuscation: Avoiding Barrington's Theorem. CCS 2014: 646-658 - Frederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser:
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation. CCS 2014: 942-953 - Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Zongren Liu, Christian A. Reuter:
Outsourced Proofs of Retrievability. CCS 2014: 831-843 - Frederik Armknecht, Jorge Guajardo:
Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014). CCS 2014: 1548-1549 - Aaron Atwater, Hassan Khan, Urs Hengartner:
POSTER: When and How to Implicitly Authenticate Smartphone Users. CCS 2014: 1415-1417 - Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen:
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World. CCS 2014: 90-102 - Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny:
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code. CCS 2014: 1342-1353 - Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. CCS 2014: 513-524 - Musard Balliu, Mads Dam, Roberto Guanciale:
Automating Information Flow Analysis of Low Level Code. CCS 2014: 1080-1091 - Gergei Bana, Hubert Comon-Lundh:
A Computationally Complete Symbolic Attacker for Equivalence Properties. CCS 2014: 609-620 - Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, David Pichardie:
System-level Non-interference for Constant-time Cryptography. CCS 2014: 1267-1279 - Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Jean-Christophe Zapalowicz:
Synthesis of Fault Attacks on Cryptographic Implementations. CCS 2014: 1016-1027 - David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski:
ARPKI: Attack Resilient Public-Key Infrastructure. CCS 2014: 382-393 - Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler, Abdulrahman Alkhelaifi:
Securing SSL Certificate Verification through Dynamic Linking. CCS 2014: 394-405 - Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila:
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. CCS 2014: 369-381 - Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov:
Deanonymisation of Clients in Bitcoin P2P Network. CCS 2014: 15-29 - Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu:
Toward Robust Hidden Volumes Using Write-Only Oblivious RAM. CCS 2014: 203-214 - Nicolás Emilio Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi:
Optimal Geo-Indistinguishable Mechanisms for Location Privacy. CCS 2014: 251-262 - Christian Cachin:
Integrity, Consistency, and Verification of Remote Computation. CCS 2014: 1538-1539 - Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, Ian Goldberg:
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. CCS 2014: 227-238 - Ran Canetti, Abhishek Jain, Alessandra Scafuro:
Practical UC security with a Global Random Oracle. CCS 2014: 597-608 - Gamze Canova, Melanie Volkamer, Simon Weiler:
POSTER: Password Entering and Transmission Security. CCS 2014: 1418-1420 - Qiang Cao, Xiaowei Yang, Jieqi Yu, Christopher Palow:
Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. CCS 2014: 477-488 - Lorenzo De Carli, Robin Sommer, Somesh Jha:
Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection. CCS 2014: 1378-1390 - Melissa Chase, Sarah Meiklejohn, Greg Zaverucha:
Algebraic MACs and Keyed-Verification Anonymous Credentials. CCS 2014: 1205-1216 - Yu-Fang Chen, Chang-Hong Hsu, Hsin-Hung Lin, Peter Schwabe, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang, Shang-Yi Yang:
Verifying Curve25519 Software. CCS 2014: 299-309 - Eric Yawei Chen, Yutong Pei, Shuo Chen, Yuan Tian, Robert Kotcher, Patrick Tague:
OAuth Demystified for Mobile Application Developers. CCS 2014: 892-903
skipping 141 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-06 17:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint