Sciweavers

14850 search results - page 103 / 2970
» The Security of
Sort
View
ESORICS
2007
Springer
15 years 10 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia
ESORICS
2009
Springer
16 years 5 months ago
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
Thorsten Holz, Markus Engelberth, Felix C. Freilin...
CCS
2009
ACM
16 years 5 months ago
An integrated approach to detection of fast and slow scanning worms
Frank Akujobi, Ioannis Lambadaris, Evangelos Krana...
WISTP
2010
Springer
15 years 11 months ago
Attribute-Based Encryption with Break-Glass
Achim D. Brucker, Helmut Petritsch, Stefan G. Webe...
IEEEARES
2010
IEEE
15 years 11 months ago
Katana: A Hot Patching Framework for ELF Executables
Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, Mi...