Search dblp for Publications

export results for "toc:db/conf/ccs/asiaccs2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/AckerNDJP12,
  author       = {Steven {Van Acker} and
                  Nick Nikiforakis and
                  Lieven Desmet and
                  Wouter Joosen and
                  Frank Piessens},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {FlashOver: automated discovery of cross-site scripting vulnerabilities
                  in rich internet applications},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {12--13},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414462},
  doi          = {10.1145/2414456.2414462},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AckerNDJP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesGKT12,
  author       = {Michael Backes and
                  Ian Goldberg and
                  Aniket Kate and
                  Tomas Toft},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Adding query privacy to robust DHTs},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {30--31},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414473},
  doi          = {10.1145/2414456.2414473},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesGKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BlantonA12,
  author       = {Marina Blanton and
                  Everaldo Aguiar},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Private and oblivious set and multiset operations},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {40--41},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414479},
  doi          = {10.1145/2414456.2414479},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BlantonA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BleikertzKNS12,
  author       = {S{\"{o}}ren Bleikertz and
                  Anil Kurmus and
                  Zolt{\'{a}}n A. Nagy and
                  Matthias Schunter},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Secure cloud maintenance: protecting workloads against insider attacks},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {83--84},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414505},
  doi          = {10.1145/2414456.2414505},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BleikertzKNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaoLRCW12,
  author       = {Yinzhi Cao and
                  Zhichun Li and
                  Vaibhav Rastogi and
                  Yan Chen and
                  Xitao Wen},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Virtual browser: a virtualized browser to sandbox third-party JavaScripts
                  with enhanced security},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {8--9},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414460},
  doi          = {10.1145/2414456.2414460},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaoLRCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chan-TinH12,
  author       = {Eric Chan{-}Tin and
                  Nicholas Hopper},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {KoNKS: konsensus-style network koordinate system},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {61--62},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414491},
  doi          = {10.1145/2414456.2414491},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Chan-TinH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenXM12,
  author       = {Ping Chen and
                  Dongyan Xu and
                  Bing Mao},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {CloudER: a framework for automatic software vulnerability location
                  and patching in the cloud},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {50},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414485},
  doi          = {10.1145/2414456.2414485},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenXM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChuLHZ12,
  author       = {Cheng{-}Kang Chu and
                  Joseph K. Liu and
                  Xinyi Huang and
                  Jianying Zhou},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Verifier-local revocation group signatures with time-bound keys},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {26--27},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414470},
  doi          = {10.1145/2414456.2414470},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChuLHZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DavisCF12,
  author       = {Benjamin Davis and
                  Hao Chen and
                  Matthew K. Franklin},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Privacy-preserving alibi systems},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {34--35},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414475},
  doi          = {10.1145/2414456.2414475},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DavisCF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DodisLXY12,
  author       = {Yevgeniy Dodis and
                  Weiliang Luo and
                  Shouhuai Xu and
                  Moti Yung},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Key-insulated symmetric key cryptography and mitigating attacks against
                  cryptographic cloud software},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {57--58},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414489},
  doi          = {10.1145/2414456.2414489},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DodisLXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GillaniAAK12,
  author       = {Syed Fida Gillani and
                  Ehab Al{-}Shaer and
                  Sardar Ali and
                  Syed Ali Khayam},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Monetizing spambot activity and understanding its relation with spambot
                  traffic features},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {51--52},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414486},
  doi          = {10.1145/2414456.2414486},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GillaniAAK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GiuffridaOC12,
  author       = {Cristiano Giuffrida and
                  Stefano Ortolani and
                  Bruno Crispo},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Memoirs of a browser: a cross-browser detection model for privacy-breaching
                  extensions},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {10--11},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414461},
  doi          = {10.1145/2414456.2414461},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GiuffridaOC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuptaDG12,
  author       = {Payas Gupta and
                  Xuhua Ding and
                  Debin Gao},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Coercion resistance in authentication responsibility shifting},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {97--98},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414512},
  doi          = {10.1145/2414456.2414512},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuptaDG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaleviS12,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {A closer look at keyboard acoustic emanations: random passwords, typing
                  styles and decoding techniques},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {89--90},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414509},
  doi          = {10.1145/2414456.2414509},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaleviS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuKBZ12,
  author       = {Jinwei Hu and
                  Khaled M. Khan and
                  Yun Bai and
                  Yan Zhang},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Constraint-enhanced role engineering via answer set programming},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {73--74},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414499},
  doi          = {10.1145/2414456.2414499},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HuKBZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiangTL12,
  author       = {Lei Jiang and
                  Jianlong Tan and
                  Yanbing Liu},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {ClusterFA: a memory-efficient {DFA} structure for network intrusion
                  detection},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {65--66},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414494},
  doi          = {10.1145/2414456.2414494},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JiangTL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JongG12,
  author       = {Chang{-}Han Jong and
                  Virgil D. Gligor},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Discovering records of private VoIP calls without wiretapping},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {67--68},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414495},
  doi          = {10.1145/2414456.2414495},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JongG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kerschbaum12,
  author       = {Florian Kerschbaum},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Outsourced private set intersection using homomorphic encryption},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {85--86},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414506},
  doi          = {10.1145/2414456.2414506},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Kerschbaum12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KhooT12,
  author       = {Khoongming Khoo and
                  Chik How Tan},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {New time-memory-data trade-off attack on the estream finalists and
                  modes of operation of block ciphers},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {20--21},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414466},
  doi          = {10.1145/2414456.2414466},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KhooT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimTLK12,
  author       = {Yu Seung Kim and
                  Patrick Tague and
                  Heejo Lee and
                  Hyogon Kim},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Carving secure wi-fi zones with defensive jamming},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {53--54},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414487},
  doi          = {10.1145/2414456.2414487},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KimTLK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KuppusamyRSBN12,
  author       = {Lakshmi Kuppusamy and
                  Jothi Rangasamy and
                  Douglas Stebila and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Practical client puzzles in the standard model},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {42--43},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414480},
  doi          = {10.1145/2414456.2414480},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KuppusamyRSBN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LaiDL12,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Yingjiu Li},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Expressive {CP-ABE} with partially hidden access structures},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {18--19},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414465},
  doi          = {10.1145/2414456.2414465},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LaiDL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiPLZ12,
  author       = {Jianwei Li and
                  Yanbin Pan and
                  Mingjie Liu and
                  Guizhen Zhu},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {An efficient broadcast attack against {NTRU}},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {22--23},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414467},
  doi          = {10.1145/2414456.2414467},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiPLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiQS12,
  author       = {Ninghui Li and
                  Wahbeh H. Qardaji and
                  Dong Su},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {On sampling, anonymization, and differential privacy or, \emph{k}-anonymization
                  meets differential privacy},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {32--33},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414474},
  doi          = {10.1145/2414456.2414474},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiQS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiW12,
  author       = {Zhiwei Li and
                  Weichao Wang},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Towards the attacker's view of protocol narrations (or, how to compile
                  security protocols)},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {44--45},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414481},
  doi          = {10.1145/2414456.2414481},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiZX12,
  author       = {Lingjun Li and
                  Xinxin Zhao and
                  Guoliang Xue},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {An identity authentication protocol in online social networks},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {28--29},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414471},
  doi          = {10.1145/2414456.2414471},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiZX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MashatanO12,
  author       = {Atefeh Mashatan and
                  Khaled Ouafi},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Forgery-resilience for digital signature schemes},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {24--25},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414469},
  doi          = {10.1145/2414456.2414469},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MashatanO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MavrogiannopoulosPP12,
  author       = {Nikos Mavrogiannopoulos and
                  Andreas Pashalidis and
                  Bart Preneel},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Security implications in Kerberos by the introduction of smart cards},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {59--60},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414490},
  doi          = {10.1145/2414456.2414490},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MavrogiannopoulosPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MayerW12,
  author       = {Daniel A. Mayer and
                  Susanne Wetzel},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Verifiable private equality test: enabling unbiased 2-party reconciliation
                  on ordered sets in the malicious model},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {46--47},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414482},
  doi          = {10.1145/2414456.2414482},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MayerW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohaisenTHK12,
  author       = {Abedelaziz Mohaisen and
                  Huy Tran and
                  Nicholas Hopper and
                  Yongdae Kim},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {On the mixing time of directed social graphs and security implications},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {36--37},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414476},
  doi          = {10.1145/2414456.2414476},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MohaisenTHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NgCP12,
  author       = {Beng Heng Ng and
                  Alexander Crowell and
                  Atul Prakash},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Adaptive semi-private email aliases},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {69--70},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414496},
  doi          = {10.1145/2414456.2414496},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NgCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NguyenM12,
  author       = {Viet Hung Nguyen and
                  Fabio Massacci},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {An independent validation of vulnerability discovery models},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {6--7},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414459},
  doi          = {10.1145/2414456.2414459},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NguyenM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ParkS12,
  author       = {Young Hee Park and
                  Salvatore J. Stolfo},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Software decoys for insider threat},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {93--94},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414511},
  doi          = {10.1145/2414456.2414511},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ParkS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PearceFNW12,
  author       = {Paul Pearce and
                  Adrienne Porter Felt and
                  Gabriel Nunez and
                  David A. Wagner},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {AdDroid: privilege separation for applications and advertisers in
                  Android},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {71--72},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414498},
  doi          = {10.1145/2414456.2414498},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PearceFNW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PelizziS12,
  author       = {Riccardo Pelizzi and
                  R. Sekar},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Protection, usability and improvements in reflected {XSS} filters},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414458},
  doi          = {10.1145/2414456.2414458},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PelizziS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PietroS12,
  author       = {Roberto Di Pietro and
                  Alessandro Sorniotti},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Boosting efficiency and security in proof of ownership for deduplication},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {81--82},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414504},
  doi          = {10.1145/2414456.2414504},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PietroS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/QardajiL12,
  author       = {Wahbeh H. Qardaji and
                  Ninghui Li},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Recursive partitioning and summarization: a practical framework for
                  differentially private data publishing},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {38--39},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414477},
  doi          = {10.1145/2414456.2414477},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/QardajiL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ReardonMCB12,
  author       = {Joel Reardon and
                  Claudio Marforio and
                  Srdjan Capkun and
                  David A. Basin},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {User-level secure deletion on log-structured file systems},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {63--64},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414493},
  doi          = {10.1145/2414456.2414493},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ReardonMCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SunCFC12,
  author       = {Hung{-}Min Sun and
                  Yao{-}Hsin Chen and
                  Chiung{-}Cheng Fang and
                  Shih{-}Ying Chang},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {PassMap: a map based graphical-password authentication system},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {99--100},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414513},
  doi          = {10.1145/2414456.2414513},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SunCFC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VasudevanMNPD12,
  author       = {Amit Vasudevan and
                  Jonathan M. McCune and
                  James Newsome and
                  Adrian Perrig and
                  Leendert van Doorn},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {{CARMA:} a hardware tamper-resistant isolated execution environment
                  on commodity x86 platforms},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {48--49},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414484},
  doi          = {10.1145/2414456.2414484},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VasudevanMNPD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VijayakumarJRSJ12,
  author       = {Hayawardh Vijayakumar and
                  Guruprasad Jakka and
                  Sandra Julieta Rueda and
                  Joshua Schiffman and
                  Trent Jaeger},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Integrity walls: finding attack surfaces from mandatory access control
                  policies},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {75--76},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414500},
  doi          = {10.1145/2414456.2414500},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VijayakumarJRSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuC12,
  author       = {Jia Xu and
                  Ee{-}Chien Chang},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Towards efficient proofs of retrievability},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {79--80},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414503},
  doi          = {10.1145/2414456.2414503},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XuC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuF12,
  author       = {Cheng Xu and
                  Philip W. L. Fong},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {The specification and compilation of obligation policies for program
                  monitoring},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {77--78},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414501},
  doi          = {10.1145/2414456.2414501},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuWZ12,
  author       = {Lei Xu and
                  Xiaoxin Wu and
                  Xinwen Zhang},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {{CL-PRE:} a certificateless proxy re-encryption scheme for secure
                  data sharing with public cloud},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {87--88},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414507},
  doi          = {10.1145/2414456.2414507},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XuWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangL12,
  author       = {Shengzhi Zhang and
                  Peng Liu},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Letting applications operate through attacks launched from compromised
                  drivers},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {91--92},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414510},
  doi          = {10.1145/2414456.2414510},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangZG12,
  author       = {Jiang Zhang and
                  Zhenfeng Zhang and
                  Aijun Ge},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Ciphertext policy attribute-based encryption from lattices},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {16--17},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414464},
  doi          = {10.1145/2414456.2414464},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangZG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhaoLX12,
  author       = {Xinxin Zhao and
                  Lingjun Li and
                  Guoliang Xue},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Keeping identity secret in online social networks},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {55--56},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414488},
  doi          = {10.1145/2414456.2414488},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhaoLX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012asia,
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2414456},
  isbn         = {978-1-4503-1648-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2012asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics