Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 56 matches
- 2014
- Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan:
Privacy through Pseudonymity in Mobile Telephony Systems. NDSS 2014 - Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck:
DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. NDSS 2014 - Adam Bates, Ryan Leonard, Hannah Pruse, Daniel Lowd, Kevin R. B. Butler:
Leveraging USB to Establish Host Identity Using Commodity Devices. NDSS 2014 - Arnar Birgisson, Joe Gibbs Politz, Úlfar Erlingsson, Ankur Taly, Michael Vrable, Mark Lentczner:
Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud. NDSS 2014 - Xavier de Carné de Carnavalet, Mohammad Mannan:
From Very Weak to Very Strong: Analyzing Password-Strength Meters. NDSS 2014 - David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. NDSS 2014 - Bo Chen, Reza Curtmola:
Auditable Version Control Systems. NDSS 2014 - Yueqiang Cheng, Zongwei Zhou, Miao Yu, Xuhua Ding, Robert H. Deng:
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks. NDSS 2014 - Johannes Dahse, Thorsten Holz:
Simulation of Built-in PHP Features for Precise Static Code Analysis. NDSS 2014 - Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, XiaoFeng Wang:
The Tangled Web of Password Reuse. NDSS 2014 - Antoine Delignat-Lavaud, Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Web PKI: Closing the Gap between Guidelines and Practices. NDSS 2014 - Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, Srihari Nelakuditi:
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. NDSS 2014 - Michael Dietz, Dan S. Wallach:
Hardening Persona - Improving Federated Web Login. NDSS 2014 - Arik Friedman, Izchak Sharfman, Daniel Keren, Assaf Schuster:
Privacy-Preserving Distributed Stream Monitoring. NDSS 2014 - Christina Garman, Matthew Green, Ian Miers:
Decentralized Anonymous Credentials. NDSS 2014 - Martin Georgiev, Suman Jana, Vitaly Shmatikov:
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks. NDSS 2014 - Younghwan Go, Eunyoung Jeong, Jongil Won, Yongdae Kim, Denis Foo Kune, KyoungSoo Park:
Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission. NDSS 2014 - Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing:
Copker: Computing with Private Keys without RAM. NDSS 2014 - Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov:
No Direction Home: The True Cost of Routing Around Decoys. NDSS 2014 - Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko:
Botcoin: Monetizing Stolen Cycles. NDSS 2014 - Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Christopher Kruegel, Sabyasachi Saha, Giovanni Vigna, Sung-Ju Lee, Marco Mellia:
Nazca: Detecting Malware Distribution in Large-Scale Networks. NDSS 2014 - Yeongjin Jang, Simon P. Chung, Bryan D. Payne, Wenke Lee:
Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications. NDSS 2014 - Dongseok Jang, Zachary Tatlock, Sorin Lerner:
SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks. NDSS 2014 - Rob Jansen, Florian Tschorsch, Aaron Johnson, Björn Scheuermann:
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. NDSS 2014 - Chia-Chi Lin, Hongyang Li, Xiao-yong Zhou, XiaoFeng Wang:
Screenmilker: How to Milk Your Android Screen for Secrets. NDSS 2014 - Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Smartphones as Practical and Secure Location Verification Tokens for Payments. NDSS 2014 - Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
Efficient Private File Retrieval by Combining ORAM and PIR. NDSS 2014 - Stephen E. McLaughlin, Saman A. Zonouz, Devin J. Pohly, Patrick D. McDaniel:
A Trusted Safety Verifier for Process Controller Code. NDSS 2014 - Antonio Nappa, Zhaoyan Xu, M. Zubair Rafique, Juan Caballero, Guofei Gu:
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers. NDSS 2014 - Muhammad Naveed, Xiao-yong Zhou, Soteris Demetriou, XiaoFeng Wang, Carl A. Gunter:
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android. NDSS 2014
skipping 26 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-21 17:48 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint