文件名称:CCS 2012论文集_ACM Conference on Computer and Communications Security
文件大小:33.04MB
文件格式:RAR
更新时间:2015-11-29 13:40:48
CCS 网络安全
CCS2012年论文集~花了一下午整理的,欢迎大家下载啊~(由于CSDN对于上传文件的大小有要求,所以只能分开上传了~见谅啊,亲
【文件预览】:
Computational Soundness Without Protocol Restrictions..pdf
DCast: Sustaining Collaboration in Overlay Multicast despite Rational Collusion..pdf
Intransitive Noninterference in Nondeterministic Systems.pdf
Leveraging“choice” to Automate Authorization Hook Placement.pdf
Aligot:Cryptographic Function Identification in Obfuscated Binary Programs.pdf
Mobile Data Charging: New Attacks and Countermeasures.pdf
Collaborative TCP Sequence Number Inference Attack.pdf
Deanonymizing Mobility Traces: Using Social Network as a Side-Channel..pdf
How secure are power network signature based time stamps?.pdf
On Significance of the Least Significant Bits For Differential Privacy..pdf
Innocent by Association: Early Recognition of Legitimate Users..pdf
Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols.pdf
Neighborhood watch: security and privacy analysis of automatic meter reading systems.pdf
Computational Verification of C Protocol Implementations by Symbolic Execution.pdf
Dynamic Searchable Symmetric Encryption.pdf
Enhancing Tor's Performance using Real-time Traffic Classification.pdf
Cross-VM Side Channels and Their Use to Extract Private Keys.pdf
Non-tracking Web Analytics.pdf
Measuring Vote Privacy, Revisited.pdf
A Software-Hardware Architecture for Self-Protecting Data.pdf
Binary Stirring:Self-randomizing Instruction Addresses of Legacy x86 Binary Code.pdf
A Cross-Protocol Attack on the TLS Protocol.pdf
GPS Software Attacks.pdf
CensorSpoofer:Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.pdf
Kargus: a Highly-scalable Software-based Intrusion Detection System..pdf
Double-Spending Fast Payments in Bitcoin.pdf
Minimizing private data disclosures in the smart grid.pdf
Foundations of Garbled Circuits.pdf
New Privacy Issues in Mobile Telephony:Fix and Verification.pdf
Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising..pdf
Adaptive Defense for Commodity Software through Virtual Application Partitioning.pdf
Blacksheep: Detecting Compromised Hosts in Homogeneous Crowds..pdf
Differentially Private Sequential Data Publication via Variable-Length N-Grams..pdf
Hourglass Schemes: How to Prove that Cloud Files Are Encrypted.pdf
FidesSelectively Hardening Software Application Components against Kernel-level or Process-level Malware.pdf
FlowFox: a Web Browser with Flexible and Precise Information Flow Control..pdf
Before We Knew It.pdf
CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities.pdf
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes..pdf
An Historical Examination of Open Source Releases and Their Vulnerabilities.pdf
Manufacturing Compromise: The Emergence of Exploit-as-a-Service.pdf