Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 208 matches
- 2019
- Michael Backes, Lucjan Hanzlik, Jonas Schneider-Bensch:
Membership Privacy for Fully Dynamic Group Signatures. CCS 2019: 2181-2198 - Max Hoffmann, Michael Klooß, Andy Rupp:
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited. CCS 2019: 2093-2110 - Jun Furukawa, Yehuda Lindell:
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest. CCS 2019: 1557-1571 - Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss:
ZombieLoad: Cross-Privilege-Boundary Data Sampling. CCS 2019: 753-768 - Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. CCS 2019: 801-815 - Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels:
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms. CCS 2019: 1171-1186 - Manish Shukla, Kumar Vidhani, Gangadhara Reddy Sirigireddy, Vijayanand Banahatti, Sachin Lodha:
pFilter: Retrofitting Legacy Applications for Data Privacy. CCS 2019: 2573-2575 - Nitin Agrawal, Ali Shahin Shamsabadi, Matt J. Kusner, Adrià Gascón:
QUOTIENT: Two-Party Secure Neural Network Training and Prediction. CCS 2019: 1231-1247 - Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, Xiaosong Zhang:
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum. CCS 2019: 1503-1520 - Yue Cao, Zhongjie Wang, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Paul L. Yu:
Principled Unearthing of TCP Side Channel Vulnerabilities. CCS 2019: 211-224 - Poulami Das, Sebastian Faust, Julian Loss:
A Formal Treatment of Deterministic Wallets. CCS 2019: 651-668 - Michael Brenner, Tancrède Lepoint, Kurt Rohloff:
WAHC'19: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptograph. CCS 2019: 2703-2704 - Daniel Günther, Ágnes Kiss, Lukas Scheidel, Thomas Schneider:
Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation. CCS 2019: 2541-2543 - Jens Müller, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, Jörg Schwenk:
Practical Decryption exFiltration: Breaking PDF Encryption. CCS 2019: 15-29 - Hao Chen, Ilaria Chillotti, Ling Ren:
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE. CCS 2019: 345-360 - Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. CCS 2019: 395-412 - Josh Aas, Richard Barnes, Benton Case, Zakir Durumeric, Peter Eckersley, Alan Flores-López, J. Alex Halderman, Jacob Hoffman-Andrews, James Kasten, Eric Rescorla, Seth D. Schoen, Brad Warren:
Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web. CCS 2019: 2473-2487 - Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai:
AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. CCS 2019: 2707-2708 - Aftab Alam, Katharina Krombholz, Sven Bugiel:
Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On. CCS 2019: 2669-2671 - Nikolaos Alexopoulos, Rolf Egert, Tim Grube, Max Mühlhäuser:
Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux. CCS 2019: 2677-2679 - José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub:
Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3. CCS 2019: 1607-1622 - José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Grégoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran:
A Machine-Checked Proof of Security for AWS Key Management Service. CCS 2019: 63-78 - Armaiti Ardeshiricham, Yoshiki Takashima, Sicun Gao, Ryan Kastner:
VeriSketch: Synthesizing Secure Hardware Designs with Timing-Sensitive Information Flow Properties. CCS 2019: 1623-1638 - Luca Arnaboldi, Roberto Metere:
Poster: Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols. CCS 2019: 2585-2587 - Hafiz Salman Asif, Periklis A. Papakonstantinou, Jaideep Vaidya:
How to Accurately and Privately Identify Anomalies. CCS 2019: 719-736 - N. Asokan:
Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead. CCS 2019: 1687 - Sana Awan, Fengjun Li, Bo Luo, Mei Liu:
Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain. CCS 2019: 2561-2563 - Vivek Kumar Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath:
Prism: Deconstructing the Blockchain to Approach Physical Limits. CCS 2019: 585-602 - Borja Balle, Adrià Gascón, Olya Ohrimenko, Mariana Raykova, Phillipp Schoppmann, Carmela Troncoso:
PPML '19: Privacy Preserving Machine Learning. CCS 2019: 2717-2718 - Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, Prateek Saxena:
Quantitative Verification of Neural Networks and Its Security Applications. CCS 2019: 1249-1264
skipping 178 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-08 14:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint