Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccsw2016.bht:"
@inproceedings{DBLP:conf/ccs/AbdelraheemGLN16, author = {Mohamed Ahmed Abdelraheem and Christian Gehrmann and Malin Lindstr{\"{o}}m and Christian Nordahl}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Executing Boolean Queries on an Encrypted Bitmap Index}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {11--22}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996436}, doi = {10.1145/2996429.2996436}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AbdelraheemGLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Artigas16, author = {Marc S{\'{a}}nchez Artigas}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Oblivious {RAM} as a Substrate for Cloud Storage - The Leakage Challenge Ahead}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {49--53}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996430}, doi = {10.1145/2996429.2996430}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Artigas16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AyacheEFK16, author = {Meryeme Ayache and Mohammed Erradi and Bernd Freisleben and Ahmed Khoumsi}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {55--59}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996431}, doi = {10.1145/2996429.2996431}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AyacheEFK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BerrimaNR16, author = {Mouhebeddine Berrima and A{\"{\i}}cha Katajina Nasr and Narjes Ben Rajeb}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Co-location Resistant Strategy with Full Resources Optimization}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {3--10}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996435}, doi = {10.1145/2996429.2996435}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BerrimaNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EtemadK16, author = {Mohammad Etemad and Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Generic Efficient Dynamic Proofs of Retrievability}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {85--96}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996439}, doi = {10.1145/2996429.2996439}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EtemadK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Franceschina16, author = {Luciano Franceschina}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Data Analytics: Understanding Human Behavior based on Mobile Network Data}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {1}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996441}, doi = {10.1145/2996429.2996441}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Franceschina16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FuhryTK16, author = {Benny Fuhry and Walter Tighzert and Florian Kerschbaum}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Encrypting Analytical Web Applications}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {35--46}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996438}, doi = {10.1145/2996429.2996438}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FuhryTK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HahnK16, author = {Florian Hahn and Florian Kerschbaum}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {23--34}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996437}, doi = {10.1145/2996429.2996437}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HahnK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HerzbergSW16, author = {Amir Herzberg and Haya Schulmann and Michael Waidner}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Stratum Filtering: Cloud-based Detection of Attack Sources}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {47--48}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996440}, doi = {10.1145/2996429.2996440}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HerzbergSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RamokapaneRS16, author = {Kopo M. Ramokapane and Awais Rashid and Jose M. Such}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Assured Deletion in the Cloud: Requirements, Challenges and Future Directions}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {97--108}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996434}, doi = {10.1145/2996429.2996434}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RamokapaneRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RitzdorfKSC16, author = {Hubert Ritzdorf and Ghassan Karame and Claudio Soriente and Srdjan Capkun}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {On Information Leakage in Deduplicated Storage Systems}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {61--72}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996432}, doi = {10.1145/2996429.2996432}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RitzdorfKSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VasilopoulosOEM16, author = {Dimitrios Vasilopoulos and Melek {\"{O}}nen and Kaoutar Elkhiyaoui and Refik Molva}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Message-Locked Proofs of Retrievability with Secure Deduplication}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {73--83}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996433}, doi = {10.1145/2996429.2996433}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VasilopoulosOEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016ccsw, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429}, doi = {10.1145/2996429}, isbn = {978-1-4503-4572-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016ccsw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.