Sciweavers

115 search results - page 19 / 23
» ccs 2009
Sort
View
CCS
2009
ACM
14 years 3 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
CCS
2009
ACM
14 years 3 months ago
Learning your identity and disease from research papers: information leaks in genome wide association study
Genome-wide association studies (GWAS) aim at discovering the association between genetic variations, particularly single-nucleotide polymorphism (SNP), and common diseases, which...
Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang,...
CCS
2009
ACM
14 years 3 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
CCS
2009
ACM
14 years 3 months ago
Dynamic provable data possession
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has receiv...
C. Christopher Erway, Alptekin Küpç&uu...
CCS
2009
ACM
14 years 3 months ago
English shellcode
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify the essential and inalienable components of an att...
Joshua Mason, Sam Small, Fabian Monrose, Greg MacM...