Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • via keystroke dynamics". Proceedings of the 4th ACM conference on Computer and Communications Security. pp. 48–56. doi:10.1145/266420.266434. Deng, Y.;...
    20 KB (2,286 words) - 19:06, 10 July 2024
  • distributed sensor networks", in Proceedings of the 9th ACM conference on Computer and communications security, Washington DC, USA, November 18–22, 2002, 41-47...
    4 KB (597 words) - 16:33, 23 January 2024
  • software trustworthiness". Proceedings of the 2nd ACM Conference on Computer and Communications Security. pp. 39–50. doi:10.1145/191177.191188. Amoroso,...
    13 KB (1,369 words) - 16:06, 12 May 2024
  • objectives, and strategies". Proceedings of the 10th ACM conference on Computer and communications security. New York, New York, USA: ACM Press. p. 179. doi:10...
    23 KB (2,481 words) - 06:47, 8 August 2023
  • Thumbnail for Clipper chip
    Encryption Standard" (PDF). Proceedings of the 2nd ACM Conference on Computer and Communications Security: 59–67. Archived (PDF) from the original on March...
    18 KB (1,893 words) - 23:22, 28 July 2023
  • Fourth-factor authentication: somebody you know. ACM Conference on Computer and Communications Security (CCS) 2006 [2] Carlo Blundo, Alfredo De Santis,...
    16 KB (1,627 words) - 01:33, 10 July 2024
  • "Vanity, cracks and malware". Proceedings of the 2012 ACM conference on Computer and communications security. CCS '12. New York, NY, USA: Association for Computing...
    76 KB (7,569 words) - 14:04, 22 July 2024
  • "Vanity, cracks and malware". Proceedings of the 2012 ACM conference on Computer and communications security. Raleigh North Carolina USA: ACM. pp. 809–820. doi:10...
    25 KB (2,761 words) - 16:24, 2 July 2024
  • of the 16th ACM Conference on Computer and Communications Security. CCS 2009: 16th ACM Conference on Computer and Communications Security. Jha, Somesh;...
    69 KB (7,087 words) - 22:43, 29 April 2024
  • Thumbnail for Carmela Troncoso
    "Protecting location privacy". Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12 (PDF). p. 617. doi:10.1145/2382196.2382261...
    19 KB (1,579 words) - 04:23, 26 July 2024
  • on speed and size. A paper presented at the 2012 ACM conference on computer and communications security showed that many applications used some of these...
    179 KB (17,630 words) - 05:48, 23 July 2024
  • Cross-Site Request Forgery, Proceedings of the 15th ACM Conference on Computer and Communications Security, ACM 2008 Joseph Foulds, Passive monitoring login...
    30 KB (3,741 words) - 08:46, 14 June 2024
  • Programming without Returns". Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 559–572. doi:10.1145/1866307.1866370...
    22 KB (2,647 words) - 07:41, 12 May 2024
  • outsourcing techniques for DoS resistance" (PDF). 11th ACM Conference on Computer and Communications Security. Archived (PDF) from the original on 2021-04-21...
    29 KB (2,989 words) - 14:30, 30 June 2024
  • Thumbnail for Attention economy
    (2008). "Spamalytics". Proceedings of the 15th ACM conference on Computer and communications security. Alexandria, Virginia, USA: ACM Press. pp. 3–14...
    35 KB (3,787 words) - 03:54, 15 July 2024
  • Thumbnail for Bitcoin protocol
    "Deanonymisation of clients in Bitcoin P2P network". ACM Conference on Computer and Communications Security. arXiv:1405.7418. Bibcode:2014arXiv1405.7418B. ISBN 9781450329576...
    22 KB (3,137 words) - 19:19, 5 July 2024
  • mobile phone accelerometers. Proceedings of the 18th ACM conference on Computer and communications security. ACM. pp. 561–562. doi:10.1145/2046707.2046771....
    45 KB (5,266 words) - 16:10, 5 July 2024
  • Thumbnail for Botnet
    24 September 2016 at the Wayback Machine, 2010 ACM Conference on Computer and Communications Security. Teresa Dixon Murray (28 September 2012). "Banks...
    58 KB (5,447 words) - 15:35, 5 July 2024
  • escrowed encryption standard", Proceedings of the 2nd ACM Conference on Computer and communications security - CCS '94, pp. 59–67, doi:10.1145/191177.191193...
    50 KB (5,322 words) - 06:51, 1 July 2024
  • Thumbnail for Warez
    protection ecosystem" (PDF). Proceedings of the 2012 ACM conference on Computer and communications security. CCS '12. Raleigh, North Carolina, USA: ACM. pp...
    51 KB (5,945 words) - 11:49, 20 May 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)