CCS 2012论文集_ACM Conference on Computer and Communications Security

时间:2015-11-29 13:40:48
【文件属性】:

文件名称:CCS 2012论文集_ACM Conference on Computer and Communications Security

文件大小:33.04MB

文件格式:RAR

更新时间:2015-11-29 13:40:48

CCS 网络安全

CCS2012年论文集~花了一下午整理的,欢迎大家下载啊~(由于CSDN对于上传文件的大小有要求,所以只能分开上传了~见谅啊,亲


【文件预览】:
Computational Soundness Without Protocol Restrictions..pdf
DCast: Sustaining Collaboration in Overlay Multicast despite Rational Collusion..pdf
Intransitive Noninterference in Nondeterministic Systems.pdf
Leveraging“choice” to Automate Authorization Hook Placement.pdf
Aligot:Cryptographic Function Identification in Obfuscated Binary Programs.pdf
Mobile Data Charging: New Attacks and Countermeasures.pdf
Collaborative TCP Sequence Number Inference Attack.pdf
Deanonymizing Mobility Traces: Using Social Network as a Side-Channel..pdf
How secure are power network signature based time stamps?.pdf
On Significance of the Least Significant Bits For Differential Privacy..pdf
Innocent by Association: Early Recognition of Legitimate Users..pdf
Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols.pdf
Neighborhood watch: security and privacy analysis of automatic meter reading systems.pdf
Computational Verification of C Protocol Implementations by Symbolic Execution.pdf
Dynamic Searchable Symmetric Encryption.pdf
Enhancing Tor's Performance using Real-time Traffic Classification.pdf
Cross-VM Side Channels and Their Use to Extract Private Keys.pdf
Non-tracking Web Analytics.pdf
Measuring Vote Privacy, Revisited.pdf
A Software-Hardware Architecture for Self-Protecting Data.pdf
Binary Stirring:Self-randomizing Instruction Addresses of Legacy x86 Binary Code.pdf
A Cross-Protocol Attack on the TLS Protocol.pdf
GPS Software Attacks.pdf
CensorSpoofer:Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.pdf
Kargus: a Highly-scalable Software-based Intrusion Detection System..pdf
Double-Spending Fast Payments in Bitcoin.pdf
Minimizing private data disclosures in the smart grid.pdf
Foundations of Garbled Circuits.pdf
New Privacy Issues in Mobile Telephony:Fix and Verification.pdf
Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising..pdf
Adaptive Defense for Commodity Software through Virtual Application Partitioning.pdf
Blacksheep: Detecting Compromised Hosts in Homogeneous Crowds..pdf
Differentially Private Sequential Data Publication via Variable-Length N-Grams..pdf
Hourglass Schemes: How to Prove that Cloud Files Are Encrypted.pdf
FidesSelectively Hardening Software Application Components against Kernel-level or Process-level Malware.pdf
FlowFox: a Web Browser with Flexible and Precise Information Flow Control..pdf
Before We Knew It.pdf
CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities.pdf
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes..pdf
An Historical Examination of Open Source Releases and Their Vulnerabilities.pdf
Manufacturing Compromise: The Emergence of Exploit-as-a-Service.pdf

网友评论

  • 还可以就是只有一半
  • 感谢分享,太好用了
  • 非常感谢楼主,省的一个个下载了
  • 很好,谢谢。不过只有一半,另一部分在哪里下载呢?
  • 非常感谢楼主整理!part1有41篇文章~辛苦了!!
  • 感谢分享,看看有关安全方面的论文,有助于博士毕业
  • 挺好的,正在找这个会议的相关论文
  • 感谢分享安全领域*会议的论文
  • 不错,就等下第2部分了
  • 很不错的资料,虽然看不完,但是绝对高水平的文章!
  • 感谢你的分享,两部分我都已经下载了,十分有用,希望都上传点这样的论文,谢谢!
  • 内容很全,非常有用,谢谢!
  • 感谢作者分享。只有41篇文章么,我看今年CCS有收录80篇啊~
  • 不是说今年的CCS会有六十篇左右吗?感觉和前几年的录取率差不多啊,top啊,只能仰望啊
  • 已经下载了,十分感谢你的分享,大家都应该分享好东西,随便说一下,论文集的另一部分呢?