![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2019
- Hasan Faik Alan, Jasleen Kaur:
Client Diversity Factor in HTTPS Webpage Fingerprinting. CODASPY 2019: 279-290 - Blake Anderson, Andrew Chi, Scott Dunlop, David A. McGrew:
Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption. CODASPY 2019: 267-278 - Z. Berkay Celik, Abbas Acar
, Hidayet Aksu, Ryan Sheatsley, Patrick D. McDaniel, A. Selcuk Uluagac
:
Curie: Policy-based Secure Data Exchange. CODASPY 2019: 121-132 - Ronny Chevalier
, Stefano Cristalli
, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. CODASPY 2019: 315-325 - Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis:
REAPER: Real-time App Analysis for Augmenting the Android Permission System. CODASPY 2019: 37-48 - Laleh Eskandarian, Dilara Akdogan, Duygu Karaoglan Altop, Albert Levi
:
SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation. CODASPY 2019: 351-362 - Maryam Fanaeepour
, Ashwin Machanavajjhala:
PrivStream: Differentially Private Event Detection on Data Streams. CODASPY 2019: 145-147 - Houtan Faridi, Srivathsan Srinivasagopalan, Rakesh M. Verma
:
Parameter Tuning and Confidence Limits of Malware Clustering. CODASPY 2019: 169-171 - Maribel Fernández
, Ian Mackie, Bhavani Thuraisingham:
Specification and Analysis of ABAC Policies via the Category-based Metamodel. CODASPY 2019: 173-184 - Philip W. L. Fong:
Results in Workflow Resiliency: Complexity, New Formulation, and ASP Encoding. CODASPY 2019: 185-196 - Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck
, Eric Bodden, Alexandre Bartel:
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware. CODASPY 2019: 25-36 - Maanak Gupta, James O. Benson
, Farhan Patwa, Ravi S. Sandhu:
Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars. CODASPY 2019: 61-72 - Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi:
Deep Neural Networks Classification over Encrypted Data. CODASPY 2019: 97-108 - Yuseok Jeon, Junghwan Rhee, Chung Hwan Kim
, Zhichun Li, Mathias Payer, Byoungyoung Lee, Zhenyu Wu:
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications. CODASPY 2019: 209-220 - Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk
:
A Study of Data Store-based Home Automation. CODASPY 2019: 73-84 - Ryosuke Kobayashi, Nobuyuki Saji, Nobuo Shigeta, Rie Shigetomi Yamaguchi:
Large Scale PoC Experiment with 57, 000 people to Accumulate Patterns for Lifestyle Authentication. CODASPY 2019: 161-163 - Wakana Maeda, Yuji Yamaoka:
Custom-made Anonymization by Data Analysis Program Provided by Recipient. CODASPY 2019: 149-151 - Alina Matyukhina, Natalia Stakhanova, Mila Dalla Preda, Celine Perley:
Adversarial Authorship Attribution in Open-Source Projects. CODASPY 2019: 291-302 - Sharad Mehrotra, Shantanu Sharma
, Jeffrey D. Ullman:
Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public Cloud. CODASPY 2019: 165-167 - Augustee Meshram, Saptarshi Das
, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
ABACaaS: Attribute-Based Access Control as a Service. CODASPY 2019: 153-155 - Mathias Morbitzer
, Manuel Huber
, Julian Horsch
:
Extracting Secrets from Encrypted Virtual Machines. CODASPY 2019: 221-230 - Nisha Panwar, Shantanu Sharma
, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes. CODASPY 2019: 49-60 - Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan:
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks. CODASPY 2019: 339-350 - Tobias F. Pfeffer, Thomas Göthel, Sabine Glesner:
Efficient and Precise Information Flow Control for Machine Code through Demand-Driven Secure Multi-Execution. CODASPY 2019: 197-208 - Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel:
Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization. CODASPY 2019: 109-119 - Asmaa Sallam, Elisa Bertino:
Result-Based Detection of Insider Threats to Relational Databases. CODASPY 2019: 133-143 - Zhibo Sun
, Carlos E. Rubio-Medrano, Ziming Zhao, Tiffany Bao, Adam Doupé, Gail-Joon Ahn
:
Understanding and Predicting Private Interactions in Underground Forums. CODASPY 2019: 303-314 - Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots. CODASPY 2019: 85-96 - Cory Thoma, Adam J. Lee
, Alexandros Labrinidis:
Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems. CODASPY 2019: 243-254 - Dave (Jing) Tian, Joseph I. Choi, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler
:
A Practical Intel SGX Setting for Linux Containers in the Cloud. CODASPY 2019: 255-266
skipping 6 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-26 06:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint