default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/asiaccs2007.bht:"
@inproceedings{DBLP:conf/ccs/ArdittiBBG07, author = {David Arditti and C{\^{o}}me Berbain and Olivier Billet and Henri Gilbert}, editor = {Feng Bao and Steven Miller}, title = {Compact {FPGA} implementations of {QUAD}}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {347--349}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229323}, doi = {10.1145/1229285.1229323}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ArdittiBBG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtallahBF07, author = {Mikhail J. Atallah and Marina Blanton and Keith B. Frikken}, editor = {Feng Bao and Steven Miller}, title = {Efficient techniques for realizing geo-spatial access control}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {82--92}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229301}, doi = {10.1145/1229285.1229301}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AtallahBF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AyyagariMLLL07, author = {Padmapriya Ayyagari and Prasenjit Mitra and Dongwon Lee and Peng Liu and Wang{-}Chien Lee}, editor = {Feng Bao and Steven Miller}, title = {Incremental adaptation of XPath access control views}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {105--116}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229303}, doi = {10.1145/1229285.1229303}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AyyagariMLLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaekSZ07, author = {Joonsang Baek and Willy Susilo and Jianying Zhou}, editor = {Feng Bao and Steven Miller}, title = {New constructions of fuzzy identity-based encryption}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {368--370}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229330}, doi = {10.1145/1229285.1229330}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BaekSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalasubramanianBCCG07, author = {Meenakshi Balasubramanian and Abhishek Bhatnagar and Namit Chaturvedi and Atish Datta Chowdhury and Arul Ganesh}, editor = {Feng Bao and Steven Miller}, title = {A framework for decentralized access control}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {93--104}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229302}, doi = {10.1145/1229285.1229302}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BalasubramanianBCCG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinOS07, author = {David A. Basin and Ernst{-}R{\"{u}}diger Olderog and Paul E. Sevin{\c{c}}}, editor = {Feng Bao and Steven Miller}, title = {Specifying and analyzing security automata using {CSP-OZ}}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {70--81}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229299}, doi = {10.1145/1229285.1229299}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BasinOS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bregman07, author = {Mark Bregman}, editor = {Feng Bao and Steven Miller}, title = {Keynote speech}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {1}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229287}, doi = {10.1145/1229285.1229287}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Bregman07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BuhanDHV07, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel and Raymond N. J. Veldhuis}, editor = {Feng Bao and Steven Miller}, title = {Fuzzy extractors for continuous distributions}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {353--355}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229325}, doi = {10.1145/1229285.1229325}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BuhanDHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CookKY07, author = {Debra L. Cook and Angelos D. Keromytis and Moti Yung}, editor = {Feng Bao and Steven Miller}, title = {Elastic block ciphers: the basic design}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {350--352}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229324}, doi = {10.1145/1229285.1229324}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CookKY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DekkerCCE07, author = {M. A. C. Dekker and J. G. Cederquist and Jason Crampton and Sandro Etalle}, editor = {Feng Bao and Steven Miller}, title = {Extended privilege inheritance in {RBAC}}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {383--385}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229335}, doi = {10.1145/1229285.1229335}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DekkerCCE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gligor07, author = {Virgil D. Gligor}, editor = {Feng Bao and Steven Miller}, title = {On the evolution of adversary models in security protocols: from the beginning to sensor networks}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {3}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229289}, doi = {10.1145/1229285.1229289}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Gligor07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrossschadlST07, author = {Johann Gro{\ss}sch{\"{a}}dl and Alexander Szekely and Stefan Tillich}, editor = {Feng Bao and Steven Miller}, title = {The energy cost of cryptographic key establishment in wireless sensor networks}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {380--382}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229334}, doi = {10.1145/1229285.1229334}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GrossschadlST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Hirohisa07, author = {Hioki Hirohisa}, editor = {Feng Bao and Steven Miller}, title = {Crocus: a steganographic filesystem manager}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {344--346}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229322}, doi = {10.1145/1229285.1229322}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Hirohisa07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Jajodia07, author = {Sushil Jajodia}, editor = {Feng Bao and Steven Miller}, title = {Topological analysis of network attack vulnerability}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {2}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229288}, doi = {10.1145/1229285.1229288}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Jajodia07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiangSL07, author = {Cheng{-}Huang Jiang and Shiuhpyng Shieh and Jen{-}Chien Liu}, editor = {Feng Bao and Steven Miller}, title = {Keystroke statistical learning model for web authentication}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {359--361}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229327}, doi = {10.1145/1229285.1229327}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JiangSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KubiakKZ07, author = {Przemyslaw Kubiak and Miroslaw Kutylowski and Filip Zag{\'{o}}rski}, editor = {Feng Bao and Steven Miller}, title = {Kleptographic attacks on a cascade of mix servers}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {57--62}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229297}, doi = {10.1145/1229285.1229297}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KubiakKZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeBM07, author = {Tri Van Le and Mike Burmester and Breno de Medeiros}, editor = {Feng Bao and Steven Miller}, title = {Universally composable and forward-secure {RFID} authentication and authenticated key exchange}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {242--252}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229319}, doi = {10.1145/1229285.1229319}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeBM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeeKHP07, author = {Heejo Lee and Minjin Kwon and Geoffrey Hasker and Adrian Perrig}, editor = {Feng Bao and Steven Miller}, title = {{BASE:} an incrementally deployable mechanism for viable {IP} spoofing prevention}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {20--31}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229293}, doi = {10.1145/1229285.1229293}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeeKHP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiD07, author = {Yingjiu Li and Xuhua Ding}, editor = {Feng Bao and Steven Miller}, title = {Protecting {RFID} communications in supply chains}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {234--241}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229318}, doi = {10.1145/1229285.1229318}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiFGC07, author = {Yang Li and Binxing Fang and Li Guo and You Chen}, editor = {Feng Bao and Steven Miller}, title = {Network anomaly detection based on {TCM-KNN} algorithm}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {13--19}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229292}, doi = {10.1145/1229285.1229292}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiFGC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiM07, author = {Ninghui Li and Ziqing Mao}, editor = {Feng Bao and Steven Miller}, title = {Administration in role-based access control}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {127--138}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229305}, doi = {10.1145/1229285.1229305}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NguyenDRHL07, author = {Lynette Qu Nguyen and Tufan Demir and Jeff Rowe and Francis Hsu and Karl N. Levitt}, editor = {Feng Bao and Steven Miller}, title = {A framework for diversifying windows native APIs to tolerate code injection attacks}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {392--394}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229338}, doi = {10.1145/1229285.1229338}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NguyenDRHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NguyenT07, author = {Anh{-}Quynh Nguyen and Yoshiyasu Takefuji}, editor = {Feng Bao and Steven Miller}, title = {A novel approach for a file-system integrity monitor tool of Xen virtual machine}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {194--202}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229313}, doi = {10.1145/1229285.1229313}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NguyenT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PangHM07, author = {Chaoyi Pang and David P. Hansen and Anthony J. Maeder}, editor = {Feng Bao and Steven Miller}, title = {Managing {RBAC} states with transitive relations}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {139--148}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229306}, doi = {10.1145/1229285.1229306}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PangHM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ParkR07, author = {Tae{-}Kyou Park and Ilkyeun Ra}, editor = {Feng Bao and Steven Miller}, title = {{SPECS:} smart partial enciphering service for accessing encrypted files with efficient and transparent}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {377--379}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229333}, doi = {10.1145/1229285.1229333}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ParkR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PatilMM07, author = {Vishwas Patil and Alessandro Mei and Luigi V. Mancini}, editor = {Feng Bao and Steven Miller}, title = {Addressing interoperability issues in access control models}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {389--391}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229337}, doi = {10.1145/1229285.1229337}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PatilMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ReidNTS07, author = {Jason Reid and Juan Manuel Gonz{\'{a}}lez Nieto and Tee Tang and Bouchra Senadji}, editor = {Feng Bao and Steven Miller}, title = {Detecting relay attacks with timing-based protocols}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {204--213}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229314}, doi = {10.1145/1229285.1229314}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ReidNTS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RoderTE07, author = {Patrick R{\"{o}}der and Omid Tafreschi and Claudia Eckert}, editor = {Feng Bao and Steven Miller}, title = {History-based access control for {XML} documents}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {386--388}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229336}, doi = {10.1145/1229285.1229336}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RoderTE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Safavi-NainiWD07, author = {Reihaneh Safavi{-}Naini and Shuhong Wang and Yvo Desmedt}, editor = {Feng Bao and Steven Miller}, title = {Unconditionally secure ring authentication}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {173--181}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229310}, doi = {10.1145/1229285.1229310}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Safavi-NainiWD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Schwan07, author = {Matthias Schwan}, editor = {Feng Bao and Steven Miller}, title = {An extended model of security policy for multi-applicative smart cards}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {226--233}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229316}, doi = {10.1145/1229285.1229316}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Schwan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SeoC07, author = {Jeongseok Seo and Sung Deok Cha}, editor = {Feng Bao and Steven Miller}, title = {Masquerade detection based on {SVM} and sequence-based user commands profile}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {398--400}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229340}, doi = {10.1145/1229285.1229340}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SeoC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShahandashtiSB07, author = {Siamak Fayyaz Shahandashti and Reihaneh Safavi{-}Naini and Joonsang Baek}, editor = {Feng Bao and Steven Miller}, title = {Concurrently-secure credential ownership proofs}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {161--172}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229309}, doi = {10.1145/1229285.1229309}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShahandashtiSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShenQ07, author = {Jianjun Shen and Sihan Qing}, editor = {Feng Bao and Steven Miller}, title = {A dynamic information flow model of secure systems}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {341--343}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229321}, doi = {10.1145/1229285.1229321}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShenQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TeoA07, author = {Lawrence Teo and Gail{-}Joon Ahn}, editor = {Feng Bao and Steven Miller}, title = {Managing heterogeneous network environments using an extensible policy framework}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {362--364}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229328}, doi = {10.1145/1229285.1229328}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TeoA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThingSD07, author = {Vrizlynn L. L. Thing and Morris Sloman and Naranker Dulay}, editor = {Feng Bao and Steven Miller}, title = {Non-intrusive {IP} traceback for DDoS attacks}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {371--373}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229331}, doi = {10.1145/1229285.1229331}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ThingSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TonienSW07, author = {Dongvu Tonien and Reihaneh Safavi{-}Naini and Peter R. Wild}, editor = {Feng Bao and Steven Miller}, title = {Combinatorial characterizations of authentication codes in verification oracle model}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {183--193}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229311}, doi = {10.1145/1229285.1229311}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TonienSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TsengWL07, author = {Chinyang Henry Tseng and Shiau{-}Huey Wang and Karl N. Levitt}, editor = {Feng Bao and Steven Miller}, title = {{DRETA:} distributed routing evidence tracing and authentication intrusion detection model for {MANET}}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {395--397}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229339}, doi = {10.1145/1229285.1229339}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TsengWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VimercatiJPS07, author = {Sabrina De Capitani di Vimercati and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Feng Bao and Steven Miller}, title = {Trust management services in relational databases}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {149--160}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229308}, doi = {10.1145/1229285.1229308}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VimercatiJPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangL07, author = {Qihua Wang and Ninghui Li}, editor = {Feng Bao and Steven Miller}, title = {Direct static enforcement of high-level security policies}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {214--225}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229315}, doi = {10.1145/1229285.1229315}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangNR07, author = {Pan Wang and Peng Ning and Douglas S. Reeves}, editor = {Feng Bao and Steven Miller}, title = {A \emph{k}-anonymous communication protocol for overlay networks}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {45--56}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229296}, doi = {10.1145/1229285.1229296}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangNR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Wei07, author = {Victor K. Wei}, editor = {Feng Bao and Steven Miller}, title = {Invisible designated confirmer signatures without random oracles}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {356--358}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229326}, doi = {10.1145/1229285.1229326}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Wei07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuY07, author = {Xiaoxin Wu and David K. Y. Yau}, editor = {Feng Bao and Steven Miller}, title = {Mitigating denial-of-service attacks in {MANET} by distributed packet filtering: a game-theoretic approach}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {365--367}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229329}, doi = {10.1145/1229285.1229329}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WuY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YanFCHEV07, author = {Guanhua Yan and Hector D. Flores and Leticia Cuellar and Nicolas W. Hengartner and Stephan J. Eidenbenz and Vincent Q. Vu}, editor = {Feng Bao and Steven Miller}, title = {Bluetooth worm propagation: mobility pattern matters!}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {32--44}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229294}, doi = {10.1145/1229285.1229294}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YanFCHEV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YoneyamaO07, author = {Kazuki Yoneyama and Kazuo Ohta}, editor = {Feng Bao and Steven Miller}, title = {Ring signatures: universally composable definitions and constructions}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {374--376}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229332}, doi = {10.1145/1229285.1229332}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YoneyamaO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuLP07, author = {Yu Yu and Jussipekka Leiwo and A. Benjamin Premkumar}, editor = {Feng Bao and Steven Miller}, title = {Private stateful circuits secure against probing attacks}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {63--69}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229298}, doi = {10.1145/1229285.1229298}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YuLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangCCS07, author = {Xinwen Zhang and Michael J. Covington and Songqing Chen and Ravi S. Sandhu}, editor = {Feng Bao and Steven Miller}, title = {SecureBus: towards application-transparent trusted computing with mandatory access control}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {117--126}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229304}, doi = {10.1145/1229285.1229304}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangCCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangRNI07, author = {Qinghua Zhang and Douglas S. Reeves and Peng Ning and S. Purushothaman Iyer}, editor = {Feng Bao and Steven Miller}, title = {Analyzing network traffic to detect self-decrypting exploit code}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {4--12}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229291}, doi = {10.1145/1229285.1229291}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangRNI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2007asia, editor = {Feng Bao and Steven Miller}, title = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {1-59593-574-6}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2007asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.