


default search action
ACM Transactions on Privacy and Security, Volume 23
Volume 23, Number 1, February 2020
- Thang Hoang

, Attila A. Yavuz
, Jorge Guajardo:
A Multi-server ORAM Framework with Constant Client Bandwidth Blowup. 1:1-1:35 - Hassan Khan, Urs Hengartner, Daniel Vogel:

Mimicry Attacks on Smartphone Keystroke Authentication. 2:1-2:34 - Ruggero Lanotte, Massimo Merro, Andrei Munteanu, Luca Viganò

:
A Formal Approach to Physics-based Attacks in Cyber-physical Systems. 3:1-3:41 - Amith K. Belman

, Vir V. Phoha
:
Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification. 4:1-4:36 - Farzaneh Karegar

, John Sören Pettersson, Simone Fischer-Hübner:
The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention. 5:1-5:38 - Fang-Jing Wu

, Tie Luo
:
CrowdPrivacy: Publish More Useful Data with Less Privacy Exposure in Crowdsourced Location-Based Services. 6:1-6:25
Volume 23, Number 2, May 2020
- Guixin Ye

, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Jungong Han, Zheng Wang
:
Using Generative Adversarial Networks to Break and Protect Text Captchas. 7:1-7:29 - Muhammad Ikram

, Rahat Masood
, Gareth Tyson, Mohamed Ali Kâafar
, Noha Loizon, Roya Ensafi:
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading. 8:1-8:27 - Moni Naor, Lior Rotem, Gil Segev:

The Security of Lazy Users in Out-of-Band Authentication. 9:1-9:32 - James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:

Build It, Break It, Fix It: Contesting Secure Development. 10:1-10:36 - Fatima M. Anwar

, Mani B. Srivastava
:
A Case for Feedforward Control with Feedback Trim to Mitigate Time Transfer Attacks. 11:1-11:25
Volume 23, Number 3, July 2020
- Sanaz Taheri Boshrooyeh

, Alptekin Küpçü
, Öznur Özkasap:
Privado: Privacy-preserving Group-based Advertising Using Multiple Independent Social Network Providers. 12:1-12:36 - Giada Sciarretta, Roberto Carbone, Silvio Ranise, Luca Viganò

:
Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login. 13:1-13:37 - Daniele Antonioli

, Nils Ole Tippenhauer
, Kasper Rasmussen:
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy. 14:1-14:28 - Hocheol Shin

, Juhwan Noh
, Dohyun Kim, Yongdae Kim
:
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure. 15:1-15:32 - Darren Hurley-Smith

, Julio C. Hernandez-Castro:
Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators. 16:1-16:25
Volume 23, Number 4, August 2020
- Mohamed Nabeel, Issa M. Khalil

, Bei Guan, Ting Yu:
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference. 17:1-17:36 - Syed Zain R. Rizvi, Philip W. L. Fong:

Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model. 18:1-18:33 - Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis, Jason Polakis:

The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks. 19:1-19:31 - Bert Abrath

, Bart Coppens, Jens Van den Broeck
, Brecht Wyseur, Alessandro Cabutto, Paolo Falcarin
, Bjorn De Sutter:
Code Renewability for Native Software Protection. 20:1-20:31 - Sagar Samtani

, Hongyi Zhu
, Hsinchun Chen:
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF). 21:1-21:33 - Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee, Konstantin Beznosov, Hyoungshick Kim:

On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better? 22:1-22:32

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














