default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/asiaccs2012.bht:"
@inproceedings{DBLP:conf/ccs/AckerNDJP12, author = {Steven {Van Acker} and Nick Nikiforakis and Lieven Desmet and Wouter Joosen and Frank Piessens}, editor = {Heung Youl Youm and Yoojae Won}, title = {FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {12--13}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414462}, doi = {10.1145/2414456.2414462}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AckerNDJP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesGKT12, author = {Michael Backes and Ian Goldberg and Aniket Kate and Tomas Toft}, editor = {Heung Youl Youm and Yoojae Won}, title = {Adding query privacy to robust DHTs}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {30--31}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414473}, doi = {10.1145/2414456.2414473}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesGKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BlantonA12, author = {Marina Blanton and Everaldo Aguiar}, editor = {Heung Youl Youm and Yoojae Won}, title = {Private and oblivious set and multiset operations}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {40--41}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414479}, doi = {10.1145/2414456.2414479}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BlantonA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BleikertzKNS12, author = {S{\"{o}}ren Bleikertz and Anil Kurmus and Zolt{\'{a}}n A. Nagy and Matthias Schunter}, editor = {Heung Youl Youm and Yoojae Won}, title = {Secure cloud maintenance: protecting workloads against insider attacks}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {83--84}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414505}, doi = {10.1145/2414456.2414505}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BleikertzKNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaoLRCW12, author = {Yinzhi Cao and Zhichun Li and Vaibhav Rastogi and Yan Chen and Xitao Wen}, editor = {Heung Youl Youm and Yoojae Won}, title = {Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {8--9}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414460}, doi = {10.1145/2414456.2414460}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaoLRCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chan-TinH12, author = {Eric Chan{-}Tin and Nicholas Hopper}, editor = {Heung Youl Youm and Yoojae Won}, title = {KoNKS: konsensus-style network koordinate system}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {61--62}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414491}, doi = {10.1145/2414456.2414491}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Chan-TinH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenXM12, author = {Ping Chen and Dongyan Xu and Bing Mao}, editor = {Heung Youl Youm and Yoojae Won}, title = {CloudER: a framework for automatic software vulnerability location and patching in the cloud}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {50}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414485}, doi = {10.1145/2414456.2414485}, timestamp = {Mon, 16 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChenXM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChuLHZ12, author = {Cheng{-}Kang Chu and Joseph K. Liu and Xinyi Huang and Jianying Zhou}, editor = {Heung Youl Youm and Yoojae Won}, title = {Verifier-local revocation group signatures with time-bound keys}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {26--27}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414470}, doi = {10.1145/2414456.2414470}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChuLHZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DavisCF12, author = {Benjamin Davis and Hao Chen and Matthew K. Franklin}, editor = {Heung Youl Youm and Yoojae Won}, title = {Privacy-preserving alibi systems}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {34--35}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414475}, doi = {10.1145/2414456.2414475}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DavisCF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DodisLXY12, author = {Yevgeniy Dodis and Weiliang Luo and Shouhuai Xu and Moti Yung}, editor = {Heung Youl Youm and Yoojae Won}, title = {Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {57--58}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414489}, doi = {10.1145/2414456.2414489}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DodisLXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GillaniAAK12, author = {Syed Fida Gillani and Ehab Al{-}Shaer and Sardar Ali and Syed Ali Khayam}, editor = {Heung Youl Youm and Yoojae Won}, title = {Monetizing spambot activity and understanding its relation with spambot traffic features}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {51--52}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414486}, doi = {10.1145/2414456.2414486}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GillaniAAK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GiuffridaOC12, author = {Cristiano Giuffrida and Stefano Ortolani and Bruno Crispo}, editor = {Heung Youl Youm and Yoojae Won}, title = {Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {10--11}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414461}, doi = {10.1145/2414456.2414461}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GiuffridaOC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuptaDG12, author = {Payas Gupta and Xuhua Ding and Debin Gao}, editor = {Heung Youl Youm and Yoojae Won}, title = {Coercion resistance in authentication responsibility shifting}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {97--98}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414512}, doi = {10.1145/2414456.2414512}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuptaDG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaleviS12, author = {Tzipora Halevi and Nitesh Saxena}, editor = {Heung Youl Youm and Yoojae Won}, title = {A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {89--90}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414509}, doi = {10.1145/2414456.2414509}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaleviS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuKBZ12, author = {Jinwei Hu and Khaled M. Khan and Yun Bai and Yan Zhang}, editor = {Heung Youl Youm and Yoojae Won}, title = {Constraint-enhanced role engineering via answer set programming}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {73--74}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414499}, doi = {10.1145/2414456.2414499}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HuKBZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiangTL12, author = {Lei Jiang and Jianlong Tan and Yanbing Liu}, editor = {Heung Youl Youm and Yoojae Won}, title = {ClusterFA: a memory-efficient {DFA} structure for network intrusion detection}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {65--66}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414494}, doi = {10.1145/2414456.2414494}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JiangTL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JongG12, author = {Chang{-}Han Jong and Virgil D. Gligor}, editor = {Heung Youl Youm and Yoojae Won}, title = {Discovering records of private VoIP calls without wiretapping}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {67--68}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414495}, doi = {10.1145/2414456.2414495}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JongG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kerschbaum12, author = {Florian Kerschbaum}, editor = {Heung Youl Youm and Yoojae Won}, title = {Outsourced private set intersection using homomorphic encryption}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {85--86}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414506}, doi = {10.1145/2414456.2414506}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kerschbaum12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KhooT12, author = {Khoongming Khoo and Chik How Tan}, editor = {Heung Youl Youm and Yoojae Won}, title = {New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {20--21}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414466}, doi = {10.1145/2414456.2414466}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KhooT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimTLK12, author = {Yu Seung Kim and Patrick Tague and Heejo Lee and Hyogon Kim}, editor = {Heung Youl Youm and Yoojae Won}, title = {Carving secure wi-fi zones with defensive jamming}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {53--54}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414487}, doi = {10.1145/2414456.2414487}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimTLK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KuppusamyRSBN12, author = {Lakshmi Kuppusamy and Jothi Rangasamy and Douglas Stebila and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Heung Youl Youm and Yoojae Won}, title = {Practical client puzzles in the standard model}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {42--43}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414480}, doi = {10.1145/2414456.2414480}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KuppusamyRSBN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaiDL12, author = {Junzuo Lai and Robert H. Deng and Yingjiu Li}, editor = {Heung Youl Youm and Yoojae Won}, title = {Expressive {CP-ABE} with partially hidden access structures}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {18--19}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414465}, doi = {10.1145/2414456.2414465}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LaiDL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiPLZ12, author = {Jianwei Li and Yanbin Pan and Mingjie Liu and Guizhen Zhu}, editor = {Heung Youl Youm and Yoojae Won}, title = {An efficient broadcast attack against {NTRU}}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {22--23}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414467}, doi = {10.1145/2414456.2414467}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiPLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiQS12, author = {Ninghui Li and Wahbeh H. Qardaji and Dong Su}, editor = {Heung Youl Youm and Yoojae Won}, title = {On sampling, anonymization, and differential privacy or, \emph{k}-anonymization meets differential privacy}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {32--33}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414474}, doi = {10.1145/2414456.2414474}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiQS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiW12, author = {Zhiwei Li and Weichao Wang}, editor = {Heung Youl Youm and Yoojae Won}, title = {Towards the attacker's view of protocol narrations (or, how to compile security protocols)}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {44--45}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414481}, doi = {10.1145/2414456.2414481}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiZX12, author = {Lingjun Li and Xinxin Zhao and Guoliang Xue}, editor = {Heung Youl Youm and Yoojae Won}, title = {An identity authentication protocol in online social networks}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {28--29}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414471}, doi = {10.1145/2414456.2414471}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiZX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MashatanO12, author = {Atefeh Mashatan and Khaled Ouafi}, editor = {Heung Youl Youm and Yoojae Won}, title = {Forgery-resilience for digital signature schemes}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {24--25}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414469}, doi = {10.1145/2414456.2414469}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MashatanO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MavrogiannopoulosPP12, author = {Nikos Mavrogiannopoulos and Andreas Pashalidis and Bart Preneel}, editor = {Heung Youl Youm and Yoojae Won}, title = {Security implications in Kerberos by the introduction of smart cards}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {59--60}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414490}, doi = {10.1145/2414456.2414490}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MavrogiannopoulosPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MayerW12, author = {Daniel A. Mayer and Susanne Wetzel}, editor = {Heung Youl Youm and Yoojae Won}, title = {Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {46--47}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414482}, doi = {10.1145/2414456.2414482}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MayerW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohaisenTHK12, author = {Abedelaziz Mohaisen and Huy Tran and Nicholas Hopper and Yongdae Kim}, editor = {Heung Youl Youm and Yoojae Won}, title = {On the mixing time of directed social graphs and security implications}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {36--37}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414476}, doi = {10.1145/2414456.2414476}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MohaisenTHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NgCP12, author = {Beng Heng Ng and Alexander Crowell and Atul Prakash}, editor = {Heung Youl Youm and Yoojae Won}, title = {Adaptive semi-private email aliases}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {69--70}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414496}, doi = {10.1145/2414456.2414496}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NgCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NguyenM12, author = {Viet Hung Nguyen and Fabio Massacci}, editor = {Heung Youl Youm and Yoojae Won}, title = {An independent validation of vulnerability discovery models}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {6--7}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414459}, doi = {10.1145/2414456.2414459}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NguyenM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ParkS12, author = {Young Hee Park and Salvatore J. Stolfo}, editor = {Heung Youl Youm and Yoojae Won}, title = {Software decoys for insider threat}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {93--94}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414511}, doi = {10.1145/2414456.2414511}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ParkS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PearceFNW12, author = {Paul Pearce and Adrienne Porter Felt and Gabriel Nunez and David A. Wagner}, editor = {Heung Youl Youm and Yoojae Won}, title = {AdDroid: privilege separation for applications and advertisers in Android}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {71--72}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414498}, doi = {10.1145/2414456.2414498}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PearceFNW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PelizziS12, author = {Riccardo Pelizzi and R. Sekar}, editor = {Heung Youl Youm and Yoojae Won}, title = {Protection, usability and improvements in reflected {XSS} filters}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {5}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414458}, doi = {10.1145/2414456.2414458}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PelizziS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PietroS12, author = {Roberto Di Pietro and Alessandro Sorniotti}, editor = {Heung Youl Youm and Yoojae Won}, title = {Boosting efficiency and security in proof of ownership for deduplication}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {81--82}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414504}, doi = {10.1145/2414456.2414504}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PietroS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/QardajiL12, author = {Wahbeh H. Qardaji and Ninghui Li}, editor = {Heung Youl Youm and Yoojae Won}, title = {Recursive partitioning and summarization: a practical framework for differentially private data publishing}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {38--39}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414477}, doi = {10.1145/2414456.2414477}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/QardajiL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ReardonMCB12, author = {Joel Reardon and Claudio Marforio and Srdjan Capkun and David A. Basin}, editor = {Heung Youl Youm and Yoojae Won}, title = {User-level secure deletion on log-structured file systems}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {63--64}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414493}, doi = {10.1145/2414456.2414493}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ReardonMCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SunCFC12, author = {Hung{-}Min Sun and Yao{-}Hsin Chen and Chiung{-}Cheng Fang and Shih{-}Ying Chang}, editor = {Heung Youl Youm and Yoojae Won}, title = {PassMap: a map based graphical-password authentication system}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {99--100}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414513}, doi = {10.1145/2414456.2414513}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SunCFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VasudevanMNPD12, author = {Amit Vasudevan and Jonathan M. McCune and James Newsome and Adrian Perrig and Leendert van Doorn}, editor = {Heung Youl Youm and Yoojae Won}, title = {{CARMA:} a hardware tamper-resistant isolated execution environment on commodity x86 platforms}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {48--49}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414484}, doi = {10.1145/2414456.2414484}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VasudevanMNPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VijayakumarJRSJ12, author = {Hayawardh Vijayakumar and Guruprasad Jakka and Sandra Julieta Rueda and Joshua Schiffman and Trent Jaeger}, editor = {Heung Youl Youm and Yoojae Won}, title = {Integrity walls: finding attack surfaces from mandatory access control policies}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {75--76}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414500}, doi = {10.1145/2414456.2414500}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VijayakumarJRSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuC12, author = {Jia Xu and Ee{-}Chien Chang}, editor = {Heung Youl Youm and Yoojae Won}, title = {Towards efficient proofs of retrievability}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {79--80}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414503}, doi = {10.1145/2414456.2414503}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XuC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuF12, author = {Cheng Xu and Philip W. L. Fong}, editor = {Heung Youl Youm and Yoojae Won}, title = {The specification and compilation of obligation policies for program monitoring}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {77--78}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414501}, doi = {10.1145/2414456.2414501}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuWZ12, author = {Lei Xu and Xiaoxin Wu and Xinwen Zhang}, editor = {Heung Youl Youm and Yoojae Won}, title = {{CL-PRE:} a certificateless proxy re-encryption scheme for secure data sharing with public cloud}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {87--88}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414507}, doi = {10.1145/2414456.2414507}, timestamp = {Wed, 06 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XuWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangL12, author = {Shengzhi Zhang and Peng Liu}, editor = {Heung Youl Youm and Yoojae Won}, title = {Letting applications operate through attacks launched from compromised drivers}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {91--92}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414510}, doi = {10.1145/2414456.2414510}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangZG12, author = {Jiang Zhang and Zhenfeng Zhang and Aijun Ge}, editor = {Heung Youl Youm and Yoojae Won}, title = {Ciphertext policy attribute-based encryption from lattices}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {16--17}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414464}, doi = {10.1145/2414456.2414464}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangZG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhaoLX12, author = {Xinxin Zhao and Lingjun Li and Guoliang Xue}, editor = {Heung Youl Youm and Yoojae Won}, title = {Keeping identity secret in online social networks}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {55--56}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414488}, doi = {10.1145/2414456.2414488}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhaoLX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2012asia, editor = {Heung Youl Youm and Yoojae Won}, title = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2414456}, isbn = {978-1-4503-1648-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2012asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.