default search action
7th AsiaCCS 2012: Seoul, Korea
- Heung Youl Youm, Yoojae Won:
7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012. ACM 2012, ISBN 978-1-4503-1648-4
Web security
- Riccardo Pelizzi, R. Sekar:
Protection, usability and improvements in reflected XSS filters. 5 - Viet Hung Nguyen, Fabio Massacci:
An independent validation of vulnerability discovery models. 6-7 - Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen, Xitao Wen:
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security. 8-9 - Cristiano Giuffrida, Stefano Ortolani, Bruno Crispo:
Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions. 10-11 - Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, Frank Piessens:
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications. 12-13
Crypto
- Jiang Zhang, Zhenfeng Zhang, Aijun Ge:
Ciphertext policy attribute-based encryption from lattices. 16-17 - Junzuo Lai, Robert H. Deng, Yingjiu Li:
Expressive CP-ABE with partially hidden access structures. 18-19 - Khoongming Khoo, Chik How Tan:
New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers. 20-21 - Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu:
An efficient broadcast attack against NTRU. 22-23
Authentication
- Atefeh Mashatan, Khaled Ouafi:
Forgery-resilience for digital signature schemes. 24-25 - Cheng-Kang Chu, Joseph K. Liu, Xinyi Huang, Jianying Zhou:
Verifier-local revocation group signatures with time-bound keys. 26-27 - Lingjun Li, Xinxin Zhao, Guoliang Xue:
An identity authentication protocol in online social networks. 28-29
Privacy
- Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding query privacy to robust DHTs. 30-31 - Ninghui Li, Wahbeh H. Qardaji, Dong Su:
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. 32-33 - Benjamin Davis, Hao Chen, Matthew K. Franklin:
Privacy-preserving alibi systems. 34-35 - Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim:
On the mixing time of directed social graphs and security implications. 36-37 - Wahbeh H. Qardaji, Ninghui Li:
Recursive partitioning and summarization: a practical framework for differentially private data publishing. 38-39
Protocol
- Marina Blanton, Everaldo Aguiar:
Private and oblivious set and multiset operations. 40-41 - Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto:
Practical client puzzles in the standard model. 42-43 - Zhiwei Li, Weichao Wang:
Towards the attacker's view of protocol narrations (or, how to compile security protocols). 44-45 - Daniel A. Mayer, Susanne Wetzel:
Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model. 46-47
Short 1
- Amit Vasudevan, Jonathan M. McCune, James Newsome, Adrian Perrig, Leendert van Doorn:
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms. 48-49 - Ping Chen, Dongyan Xu, Bing Mao:
CloudER: a framework for automatic software vulnerability location and patching in the cloud. 50 - Syed Fida Gillani, Ehab Al-Shaer, Sardar Ali, Syed Ali Khayam:
Monetizing spambot activity and understanding its relation with spambot traffic features. 51-52 - Yu Seung Kim, Patrick Tague, Heejo Lee, Hyogon Kim:
Carving secure wi-fi zones with defensive jamming. 53-54 - Xinxin Zhao, Lingjun Li, Guoliang Xue:
Keeping identity secret in online social networks. 55-56 - Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung:
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. 57-58 - Nikos Mavrogiannopoulos, Andreas Pashalidis, Bart Preneel:
Security implications in Kerberos by the introduction of smart cards. 59-60 - Eric Chan-Tin, Nicholas Hopper:
KoNKS: konsensus-style network koordinate system. 61-62
System
- Joel Reardon, Claudio Marforio, Srdjan Capkun, David A. Basin:
User-level secure deletion on log-structured file systems. 63-64 - Lei Jiang, Jianlong Tan, Yanbing Liu:
ClusterFA: a memory-efficient DFA structure for network intrusion detection. 65-66 - Chang-Han Jong, Virgil D. Gligor:
Discovering records of private VoIP calls without wiretapping. 67-68 - Beng Heng Ng, Alexander Crowell, Atul Prakash:
Adaptive semi-private email aliases. 69-70
Access control
- Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David A. Wagner:
AdDroid: privilege separation for applications and advertisers in Android. 71-72 - Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang:
Constraint-enhanced role engineering via answer set programming. 73-74 - Hayawardh Vijayakumar, Guruprasad Jakka, Sandra Julieta Rueda, Joshua Schiffman, Trent Jaeger:
Integrity walls: finding attack surfaces from mandatory access control policies. 75-76 - Cheng Xu, Philip W. L. Fong:
The specification and compilation of obligation policies for program monitoring. 77-78
Cloud security
- Jia Xu, Ee-Chien Chang:
Towards efficient proofs of retrievability. 79-80 - Roberto Di Pietro, Alessandro Sorniotti:
Boosting efficiency and security in proof of ownership for deduplication. 81-82 - Sören Bleikertz, Anil Kurmus, Zoltán A. Nagy, Matthias Schunter:
Secure cloud maintenance: protecting workloads against insider attacks. 83-84 - Florian Kerschbaum:
Outsourced private set intersection using homomorphic encryption. 85-86 - Lei Xu, Xiaoxin Wu, Xinwen Zhang:
CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. 87-88
Short 2
- Tzipora Halevi, Nitesh Saxena:
A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques. 89-90 - Shengzhi Zhang, Peng Liu:
Letting applications operate through attacks launched from compromised drivers. 91-92 - Young Hee Park, Salvatore J. Stolfo:
Software decoys for insider threat. 93-94 - Payas Gupta, Xuhua Ding, Debin Gao:
Coercion resistance in authentication responsibility shifting. 97-98 - Hung-Min Sun, Yao-Hsin Chen, Chiung-Cheng Fang, Shih-Ying Chang:
PassMap: a map based graphical-password authentication system. 99-100
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.