


default search action
ACM Transactions on Privacy and Security, Volume 25
Volume 25, Number 1, February 2022
- Savvas Savvides, Seema Kumar, Julian James Stephen

, Patrick Eugster:
C3PO: Cloud-based Confidentiality-preserving Continuous Query Processing. 1:1-1:36 - Stefano Berlato

, Roberto Carbone
, Adam J. Lee
, Silvio Ranise
:
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud. 2:1-2:37 - Handan Kilinç Alper, Alptekin Küpçü

:
Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation. 3:1-3:34 - Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch:

Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study. 4:1-4:28 - Sibghat Ullah Bazai, Julian Jang-Jaccard

, Hooman Alavizadeh
:
A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark. 5:1-5:25 - Fabio Pagani, Davide Balzarotti:

AutoProfile: Towards Automated Profile Generation for Memory Analysis. 6:1-6:26 - Angelo Massimo Perillo, Giuseppe Persiano, Alberto Trombetta:

Secure Selections on Encrypted Multi-writer Streams. 7:1-7:33
Volume 25, Number 2, May 2022
- Lennart Braun, Daniel Demmler, Thomas Schneider

, Oleksandr Tkachenko:
MOTION - A Framework for Mixed-Protocol Multi-Party Computation. 8:1-8:35 - Marcus Botacin, Francis B. Moreira, Philippe O. A. Navaux, André Grégio, Marco A. Z. Alves:

Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints. 9:1-9:34 - Xueou Wang

, Xiaolu Hou
, Ruben Rios
, Nils Ole Tippenhauer
, Martín Ochoa
:
Constrained Proximity Attacks on Mobile Targets. 10:1-10:29 - Alexandre Debant

, Stéphanie Delaune
, Cyrille Wiedling
:
So Near and Yet So Far - Symbolic Verification of Distance-Bounding Protocols. 11:1-11:39 - Yevhen Zolotavkin, Jongkil Jay Jeong

, Veronika Kuchta
, Maksym Slavnenko
, Robin Doss
:
Improving Unlinkability of Attribute-based Authentication through Game Theory. 12:1-12:36 - Nadia Daoudi

, Kevin Allix, Tegawendé François D. Assise Bissyandé, Jacques Klein:
A Deep Dive Inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores. 13:1-13:28 - Pascal Oser

, Rens W. van der Heijden
, Stefan Lüders
, Frank Kargl
:
Risk Prediction of IoT Devices Based on Vulnerability Analysis. 14:1-14:36 - Julian de Gortari Briseno

, Akash Deep Singh, Mani Srivastava:
InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks. 15:1-15:26
Volume 25, Number 3, August 2022
- Chris Clifton, Eric J. Hanson

, Keith Merrill
, Shawn Merrill:
Differentially Private k-Nearest Neighbor Missing Data Imputation. 16:1-16:23 - Yuxuan Chen

, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang
, Kai Chen, Xiaofeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. 17:1-17:31 - Max Landauer

, Florian Skopik
, Markus Wurzenberger
, Andreas Rauber:
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation. 18:1-18:36 - Cláudio Martins

, Ibéria Medeiros
:
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy. 19:1-19:39 - Mário S. Alvim

, Konstantinos Chatzikokolakis
, Yusuke Kawamoto
, Catuscia Palamidessi
:
Information Leakage Games: Exploring Information as a Utility Function. 20:1-20:36 - Andreas Fischer

, Benny Fuhry
, Jörn Kußmaul
, Jonas Janneck
, Florian Kerschbaum
, Eric Bodden
:
Computation on Encrypted Data Using Dataflow Authentication. 21:1-21:36 - Padmavathi Iyer

, Amirreza Masoumzadeh
:
Learning Relationship-Based Access Control Policies from Black-Box Systems. 22:1-22:36 - Yaguan Qian

, Yankai Guo
, Qiqi Shao
, Jiamin Wang
, Bin Wang
, Zhaoquan Gu
, Xiang Ling
, Chunming Wu
:
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks. 23:1-23:24 - Adi Akavia

, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald:
Privacy-Preserving Decision Trees Training and Prediction. 24:1-24:30
Volume 25, Number 4, November 2022
- Ellis Fenske

, Akshaya Mani
, Aaron Johnson
, Micah Sherr
:
Accountable Private Set Cardinality for Distributed Measurement. 25:1-25:35 - Sarah M. Lehman

, Abrar S. Alrumayh, Kunal Kolhe, Haibin Ling, Chiu C. Tan:
Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications. 26:1-26:35 - Andrea Oliveri

, Davide Balzarotti
:
In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics. 27:1-27:32 - Jason Crampton, Eduard Eiben, Gregory Z. Gutin

, Daniel Karapetyan, Diptapriyo Majumdar
:
Valued Authorization Policy Existence Problem: Theory and Experiments. 28:1-28:32 - Lihi Idan

, Joan Feigenbaum
:
PRShare: A Framework for Privacy-preserving, Interorganizational Data Sharing. 29:1-29:38 - Milica Stojmenovic

, Eric Spero
, Milos Stojmenovic
, Robert Biddle
:
What is Beautiful is Secure. 30:1-30:30 - Eyal Nussbaum

, Michael Segal
:
Privacy Analysis of Query-Set-Size Control. 31:1-31:19 - Jinhua Cui

, Shweta Shinde
, Satyaki Sen
, Prateek Saxena
, Pinghai Yuan
:
Dynamic Binary Translation for SGX Enclaves. 32:1-32:40 - William Blair

, Andrea Mambretti
, Sajjad Arshad
, Michael Weissbacher
, William Robertson
, Engin Kirda
, Manuel Egele
:
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. 33:1-33:35 - Alesia Chernikova

, Alina Oprea
:
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments. 34:1-34:34

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














