Jump to content

Search results

  • a preprint server allowing submitted papers to be classified using the ACM CCS Physics Subject Headings Coulter, Neal (1997), "ACM's computing classification...
    8 KB (365 words) - 05:24, 12 April 2024
  • Thumbnail for Yehuda Lindell
    composition of Authenticated Byzantine Agreement, and the best paper award at ACM CCS 2016 for work on high-throughput MPC protocols. In 2021, Lindell published...
    9 KB (960 words) - 16:14, 14 May 2024
  • against mass surveillance published at CRYPTO 2014. Best Paper Award at ACM CCS 2016 for work with Martin Albrecht, Jean Paul Degabriele and Torben Hansen...
    6 KB (517 words) - 19:29, 11 April 2024
  • Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data ACM CCS (2006) Melissa Chase, Multi-authority Attribute-Based Encryption TCC (2007)...
    11 KB (1,325 words) - 13:44, 22 March 2024
  • Multi-Agent Systems". Springer. "Journal of Scientific Computing". www.scimagojr.com. "Simulation & Gaming". SAGE Journals. "ACM CCS 2020 - November 9-13, 2020"...
    34 KB (2,867 words) - 22:16, 30 June 2024
  • OpenVPN". ACM CCS 2016. Archived from the original on 2016-10-09. Tom Gonzalez (January 2007). "A Reflection Attack on Blowfish" (PDF). Journal of LATEX...
    16 KB (1,807 words) - 19:26, 15 July 2024
  • Thumbnail for Home automation
    Beresford, Alastair R.; Rice, Andrew (2015). Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM...
    24 KB (2,607 words) - 15:59, 5 July 2024
  • Charles Bouillaguet Deanonymisation of Clients in Bitcoin P2P Network, ACM CCS 2014 with Alex Biryukov and Ivan Pustogarov Collision Spectrum, Entropy...
    13 KB (1,347 words) - 20:29, 6 May 2024
  • B. Pinkas, "FairplayMP: a system for secure multi-party computation," ACM CCS 2008, pp. 257–266, 2008. B. Pinkas, T. Schneider, N. Smart and S. Williams...
    42 KB (5,864 words) - 17:13, 6 April 2024
  • Thumbnail for Li Gong (computer scientist)
    information security. He was both Program Chair and General Conference Chair for ACM CCS, IEEE S&P, and IEEE CSFW. He was Associate Editor of ACM TISSEC and Associate...
    9 KB (921 words) - 11:16, 10 June 2024
  • Injecting Faults". In Feigenbaum, Joan (ed.). Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers...
    44 KB (4,849 words) - 18:39, 22 June 2024
  • its efficiency against many popular CAPTCHA schemas. In October 2018 at ACM CCS'18 conference, Ye et al. presented a deep learning-based attack that could...
    39 KB (3,639 words) - 15:19, 19 June 2024
  • Beresford, Alastair R.; Rice, Andrew (2015). Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices – SPSM...
    184 KB (19,810 words) - 07:41, 26 July 2024
  • Context-free attacks using keyboard acoustic emanations. In Proceedings of ACM CCS 2014. Yang, L., Chen, Y., Li, X. Y., Xiao, C., Li, M., & Liu, Y. Tagoram:...
    22 KB (2,290 words) - 23:48, 1 May 2024