Sciweavers

14850 search results - page 103 / 2970
» The Security of
Sort
View
ESORICS
2007
Springer
14 years 4 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia
ESORICS
2009
Springer
14 years 10 months ago
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
Thorsten Holz, Markus Engelberth, Felix C. Freilin...
CCS
2009
ACM
14 years 10 months ago
An integrated approach to detection of fast and slow scanning worms
Frank Akujobi, Ioannis Lambadaris, Evangelos Krana...
WISTP
2010
Springer
14 years 5 months ago
Attribute-Based Encryption with Break-Glass
Achim D. Brucker, Helmut Petritsch, Stefan G. Webe...
IEEEARES
2010
IEEE
14 years 4 months ago
Katana: A Hot Patching Framework for ELF Executables
Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, Mi...