Search results
Appearance
The page ""ACM Conference on Computer and Communications Security" magazine" does not exist. You can create a draft and submit it for review or request that a redirect be created, but consider checking the search results below to see whether the topic is already covered.
- via keystroke dynamics". Proceedings of the 4th ACM conference on Computer and Communications Security. pp. 48–56. doi:10.1145/266420.266434. Deng, Y.;...20 KB (2,286 words) - 19:06, 10 July 2024
- distributed sensor networks", in Proceedings of the 9th ACM conference on Computer and communications security, Washington DC, USA, November 18–22, 2002, 41-47...4 KB (597 words) - 16:33, 23 January 2024
- software trustworthiness". Proceedings of the 2nd ACM Conference on Computer and Communications Security. pp. 39–50. doi:10.1145/191177.191188. Amoroso,...13 KB (1,369 words) - 16:06, 12 May 2024
- objectives, and strategies". Proceedings of the 10th ACM conference on Computer and communications security. New York, New York, USA: ACM Press. p. 179. doi:10...23 KB (2,481 words) - 06:47, 8 August 2023
- Encryption Standard" (PDF). Proceedings of the 2nd ACM Conference on Computer and Communications Security: 59–67. Archived (PDF) from the original on March...18 KB (1,893 words) - 23:22, 28 July 2023
- Fourth-factor authentication: somebody you know. ACM Conference on Computer and Communications Security (CCS) 2006 [2] Carlo Blundo, Alfredo De Santis,...16 KB (1,627 words) - 01:33, 10 July 2024
- "Vanity, cracks and malware". Proceedings of the 2012 ACM conference on Computer and communications security. CCS '12. New York, NY, USA: Association for Computing...76 KB (7,569 words) - 14:04, 22 July 2024
- "Vanity, cracks and malware". Proceedings of the 2012 ACM conference on Computer and communications security. Raleigh North Carolina USA: ACM. pp. 809–820. doi:10...25 KB (2,761 words) - 16:24, 2 July 2024
- of the 16th ACM Conference on Computer and Communications Security. CCS 2009: 16th ACM Conference on Computer and Communications Security. Jha, Somesh;...69 KB (7,087 words) - 22:43, 29 April 2024
- "Protecting location privacy". Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12 (PDF). p. 617. doi:10.1145/2382196.2382261...19 KB (1,579 words) - 04:23, 26 July 2024
- on speed and size. A paper presented at the 2012 ACM conference on computer and communications security showed that many applications used some of these...179 KB (17,630 words) - 05:48, 23 July 2024
- Cross-Site Request Forgery, Proceedings of the 15th ACM Conference on Computer and Communications Security, ACM 2008 Joseph Foulds, Passive monitoring login...30 KB (3,741 words) - 08:46, 14 June 2024
- Programming without Returns". Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 559–572. doi:10.1145/1866307.1866370...22 KB (2,647 words) - 07:41, 12 May 2024
- outsourcing techniques for DoS resistance" (PDF). 11th ACM Conference on Computer and Communications Security. Archived (PDF) from the original on 2021-04-21...29 KB (2,989 words) - 14:30, 30 June 2024
- (2008). "Spamalytics". Proceedings of the 15th ACM conference on Computer and communications security. Alexandria, Virginia, USA: ACM Press. pp. 3–14...35 KB (3,787 words) - 03:54, 15 July 2024
- "Deanonymisation of clients in Bitcoin P2P network". ACM Conference on Computer and Communications Security. arXiv:1405.7418. Bibcode:2014arXiv1405.7418B. ISBN 9781450329576...22 KB (3,137 words) - 19:19, 5 July 2024
- mobile phone accelerometers. Proceedings of the 18th ACM conference on Computer and communications security. ACM. pp. 561–562. doi:10.1145/2046707.2046771....45 KB (5,266 words) - 16:10, 5 July 2024
- 24 September 2016 at the Wayback Machine, 2010 ACM Conference on Computer and Communications Security. Teresa Dixon Murray (28 September 2012). "Banks...58 KB (5,447 words) - 15:35, 5 July 2024
- escrowed encryption standard", Proceedings of the 2nd ACM Conference on Computer and communications security - CCS '94, pp. 59–67, doi:10.1145/191177.191193...50 KB (5,322 words) - 06:51, 1 July 2024
- protection ecosystem" (PDF). Proceedings of the 2012 ACM conference on Computer and communications security. CCS '12. Raleigh, North Carolina, USA: ACM. pp...51 KB (5,945 words) - 11:49, 20 May 2024
- engineering of input formats. In Proceedings of the 15th ACM Conference on Computer and Communications Security, pages 391-402. ACM, Oct 2008. P. M. Comparetti