CCS 2012论文集(part2)_ACM Conference on Computer and Communications Security

时间:2015-11-29 13:47:50
【文件属性】:

文件名称:CCS 2012论文集(part2)_ACM Conference on Computer and Communications Security

文件大小:29.97MB

文件格式:RAR

更新时间:2015-11-29 13:47:50

CCS 网络安全

这个跟前面的part1组合起来才是整份的哦亲~欢迎下载共同学习共同进步


【文件预览】:
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing.pdf
Salus: A System for Server-Aided Secure Function Evaluation..pdf
Priceless:The Role of Payments in Abuse-advertised Goods.pdf
Operating System Framed in Case of Mistaken Identity.pdf
Privacy-Aware Personalization for Mobile Advertising.pdf
Vigilare Toward Snoop-based Kernel Integrity Monitor.pdf
StegoTorus:A Camouflage Proxy for the Tor Anonymity System.pdf
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions..pdf
Why Eve and Mallory Love Android:An Analysis of Android SSL(In) Security.pdf
Populated IP Addresses — Classification and Applications.pdf
SABOT: specification-based payload generation for programmable logic controllers.pdf
Routing Around Decoys.pdf
Secure Two-Party Computations in ANSI C.pdf
The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems..pdf
Verified Security of Redundancy-Free Encryption from Rabin and RSA..pdf
TreeDroid: A Tree Automaton Based Approach to Enforcing Data Processing Policies..pdf
Vanity, Cracks and Malware.pdf
PScout: Analyzing the Android Permission Specification.pdf
Towards a Bayesian Network Game Framework for Evaluating DDoS Attacks and Defense..pdf
Using Probabilistic Generative Models for Ranking Risks of Android Apps.pdf
PrivateFS:A Parallel Oblivious File System.pdf
Strengthening user authentication through opportunistic cryptographic identity assertions.pdf
Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices..pdf
Resource-Freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense).pdf
SkypeMorph:Protocol Obfuscation for Tor Bridges.pdf
PERM: Practical Reputation-Based Blacklisting without TTPs..pdf
Single Round Access Privacy on Outsourced Storage..pdf
Secure Two-Party Computation in Sublinear (Amortized) Time..pdf
Precise Enforcement of Progress-Sensitive Security.pdf
Touching from a Distance: Website Fingerprinting Attacks and Defenses..pdf
Protecting Location Privacy: Optimal Strategy against Localization Attacks..pdf
You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions..pdf
Self-service Cloud Computing..pdf
PeerPress: Utilizing Enemies' P2P Strength against Them..pdf
The Most Dangerous Code in the World:Validating SSl Certificates in Non-Browser Software.pdf
Scriptless Attacks..pdf
Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications..pdf
On the Parameterized Complexity of the Workflow Satisfiability Problem.pdf
OTO:online trust oracle for user-centric trust establishment.pdf
Verifiable Data Streaming.pdf

网友评论

  • 感谢分享,正在写论文参考一下
  • 非常好的文章
  • 谢谢分享,希望早些更新CCS2014
  • 不错,很便捷。。
  • 挺好的,正在找这个会议的论文
  • 安全*会议CCS论文,感谢分享
  • 一直在看这方面的东西,很有用
  • 不错,正在写论文,有参考
  • 加一起81篇,我查了,正好的,不缺
  • 安全类*会议,感谢分享!
  • 谢谢,本人一直关注安全类*会议!
  • 这只是part2,大家别忘了还要下载part1,两个加起来有80篇paper,谢谢分享
  • 这是第二部分,文章感觉还是不够全面。目测数量,感觉不完整。
  • 感谢你的无私分享,解决了我的大难题,内容很全,很有用,谢谢!