Search results
Appearance
The page ""ACM CCS" journal" does not exist. You can create a draft and submit it for review or request that a redirect be created, but consider checking the search results below to see whether the topic is already covered.
- ACM Computing Classification System (redirect from ACM CCS)a preprint server allowing submitted papers to be classified using the ACM CCS Physics Subject Headings Coulter, Neal (1997), "ACM's computing classification...8 KB (365 words) - 05:24, 12 April 2024
- composition of Authenticated Byzantine Agreement, and the best paper award at ACM CCS 2016 for work on high-throughput MPC protocols. In 2021, Lindell published...9 KB (960 words) - 16:14, 14 May 2024
- against mass surveillance published at CRYPTO 2014. Best Paper Award at ACM CCS 2016 for work with Martin Albrecht, Jean Paul Degabriele and Torben Hansen...6 KB (517 words) - 19:29, 11 April 2024
- Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data ACM CCS (2006) Melissa Chase, Multi-authority Attribute-Based Encryption TCC (2007)...11 KB (1,325 words) - 13:44, 22 March 2024
- Informatics (section Journals and conferences)Multi-Agent Systems". Springer. "Journal of Scientific Computing". www.scimagojr.com. "Simulation & Gaming". SAGE Journals. "ACM CCS 2020 - November 9-13, 2020"...34 KB (2,867 words) - 22:16, 30 June 2024
- OpenVPN". ACM CCS 2016. Archived from the original on 2016-10-09. Tom Gonzalez (January 2007). "A Reflection Attack on Blowfish" (PDF). Journal of LATEX...16 KB (1,807 words) - 19:26, 15 July 2024
- Beresford, Alastair R.; Rice, Andrew (2015). Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM...24 KB (2,607 words) - 15:59, 5 July 2024
- Charles Bouillaguet Deanonymisation of Clients in Bitcoin P2P Network, ACM CCS 2014 with Alex Biryukov and Ivan Pustogarov Collision Spectrum, Entropy...13 KB (1,347 words) - 20:29, 6 May 2024
- B. Pinkas, "FairplayMP: a system for secure multi-party computation," ACM CCS 2008, pp. 257–266, 2008. B. Pinkas, T. Schneider, N. Smart and S. Williams...42 KB (5,864 words) - 17:13, 6 April 2024
- information security. He was both Program Chair and General Conference Chair for ACM CCS, IEEE S&P, and IEEE CSFW. He was Associate Editor of ACM TISSEC and Associate...9 KB (921 words) - 11:16, 10 June 2024
- Injecting Faults". In Feigenbaum, Joan (ed.). Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers...44 KB (4,849 words) - 18:39, 22 June 2024
- its efficiency against many popular CAPTCHA schemas. In October 2018 at ACM CCS'18 conference, Ye et al. presented a deep learning-based attack that could...39 KB (3,639 words) - 15:19, 19 June 2024
- Beresford, Alastair R.; Rice, Andrew (2015). Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices – SPSM...184 KB (19,810 words) - 07:41, 26 July 2024
- Context-free attacks using keyboard acoustic emanations. In Proceedings of ACM CCS 2014. Yang, L., Chen, Y., Li, X. Y., Xiao, C., Li, M., & Liu, Y. Tagoram:...22 KB (2,290 words) - 23:48, 1 May 2024