Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs2007.bht:"
@inproceedings{DBLP:conf/ccs/Adida07, author = {Ben Adida}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Beamauth: two-factor web authentication with a bookmark}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {48--57}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315253}, doi = {10.1145/1315245.1315253}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Adida07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseBCHKPS07, author = {Giuseppe Ateniese and Randal C. Burns and Reza Curtmola and Joseph Herring and Lea Kissner and Zachary N. J. Peterson and Dawn Xiaodong Song}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Provable data possession at untrusted stores}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {598--609}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315318}, doi = {10.1145/1315245.1315318}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseBCHKPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Azimi-SadjadiKMY07, author = {Babak Azimi{-}Sadjadi and Aggelos Kiayias and Alejandra Mercado and B{\"{u}}lent Yener}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Robust key generation from signal envelopes in wireless networks}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {401--410}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315295}, doi = {10.1145/1315245.1315295}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Azimi-SadjadiKMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaileyBGJ07, author = {Daniel V. Bailey and Dan Boneh and Eu{-}Jin Goh and Ari Juels}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Covert channels in privacy-preserving identification systems}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {297--306}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315283}, doi = {10.1145/1315245.1315283}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BaileyBGJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalzarottiCFV07, author = {Davide Balzarotti and Marco Cova and Viktoria Felmetsger and Giovanni Vigna}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Multi-module vulnerability analysis of web-based applications}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {25--35}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315250}, doi = {10.1145/1315245.1315250}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BalzarottiCFV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BandhakaviBMV07, author = {Sruthi Bandhakavi and Prithvi Bisht and P. Madhusudan and V. N. Venkatakrishnan}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {{CANDID:} preventing sql injection attacks using dynamic candidate evaluations}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {12--24}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315249}, doi = {10.1145/1315245.1315249}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BandhakaviBMV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoldyrevaGOY07, author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {276--285}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315280}, doi = {10.1145/1315245.1315280}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoldyrevaGOY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BorisovDMT07, author = {Nikita Borisov and George Danezis and Prateek Mittal and Parisa Tabriz}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Denial of service or denial of security?}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {92--102}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315258}, doi = {10.1145/1315245.1315258}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BorisovDMT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrickellPSW07, author = {Justin Brickell and Donald E. Porter and Vitaly Shmatikov and Emmett Witchel}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Privacy-preserving remote diagnostics}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {498--507}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315307}, doi = {10.1145/1315245.1315307}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrickellPSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BunnO07, author = {Paul Bunn and Rafail Ostrovsky}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Secure two-party k-means clustering}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {486--497}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315306}, doi = {10.1145/1315245.1315306}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BunnO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaballeroYLS07, author = {Juan Caballero and Heng Yin and Zhenkai Liang and Dawn Xiaodong Song}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Polyglot: automatic extraction of protocol message format using dynamic binary analysis}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {317--329}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315286}, doi = {10.1145/1315245.1315286}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaballeroYLS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CabukDRS07, author = {Serdar Cabuk and Chris I. Dalton and HariGovind V. Ramasamy and Matthias Schunter}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Towards automated provisioning of secure virtualized networks}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {235--245}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315275}, doi = {10.1145/1315245.1315275}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CabukDRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CanettiH07, author = {Ran Canetti and Susan Hohenberger}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Chosen-ciphertext secure proxy re-encryption}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {185--194}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315269}, doi = {10.1145/1315245.1315269}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CanettiH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenRW07, author = {Shuo Chen and David Ross and Yi{-}Min Wang}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {2--11}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315248}, doi = {10.1145/1315245.1315248}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenRW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CheungN07, author = {Ling Cheung and Calvin C. Newport}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Provably secure ciphertext policy {ABE}}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {456--465}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315302}, doi = {10.1145/1315245.1315302}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CheungN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CrandallZBBE07, author = {Jedidiah R. Crandall and Daniel Zinn and Michael Byrd and Earl T. Barr and Rich East}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {ConceptDoppler: a weather tracker for internet censorship}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {352--365}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315290}, doi = {10.1145/1315245.1315290}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CrandallZBBE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DewriPRW07, author = {Rinku Dewri and Nayot Poolsappasit and Indrajit Ray and L. Darrell Whitley}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Optimal security hardening using multi-objective optimization on attack tree models of networks}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {204--213}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315272}, doi = {10.1145/1315245.1315272}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DewriPRW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DorrendorfGP07, author = {Leo Dorrendorf and Zvi Gutterman and Benny Pinkas}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Cryptanalysis of the windows random number generator}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {476--485}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315304}, doi = {10.1145/1315245.1315304}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DorrendorfGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DunphyY07, author = {Paul Dunphy and Jeff Yan}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Do background images improve "draw a secret" graphical passwords?}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {36--47}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315252}, doi = {10.1145/1315245.1315252}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DunphyY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DwoskinL07, author = {Jeffrey S. Dwoskin and Ruby B. Lee}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Hardware-rooted trust for secure key management and transient trust}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {389--400}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315294}, doi = {10.1145/1315245.1315294}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DwoskinL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ElsonDHS07, author = {Jeremy Elson and John R. Douceur and Jon Howell and Jared Saul}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Asirra: a {CAPTCHA} that exploits interest-aligned manual image categorization}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {366--374}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315291}, doi = {10.1145/1315245.1315291}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ElsonDHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FranklinP07, author = {Jason Franklin and Adrian Perrig and Vern Paxson and Stefan Savage}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {An inquiry into the nature and causes of the wealth of internet miscreants}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {375--388}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315292}, doi = {10.1145/1315245.1315292}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FranklinP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GareraR07, author = {Sujata Garera and Aviel D. Rubin}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {An independent audit framework for software dependent voting systems}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {256--265}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315278}, doi = {10.1145/1315245.1315278}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GareraR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GianvecchioW07, author = {Steven Gianvecchio and Haining Wang}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Detecting covert timing channels: an entropy-based approach}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {307--316}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315284}, doi = {10.1145/1315245.1315284}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GianvecchioW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GonzalezPW07, author = {Jos{\'{e}} M. Gonz{\'{a}}lez and Vern Paxson and Nicholas Weaver}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {139--149}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315264}, doi = {10.1145/1315245.1315264}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GonzalezPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaldermanW07, author = {J. Alex Halderman and Brent Waters}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Harvesting verifiable challenges from oblivious online sources}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {330--341}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315287}, doi = {10.1145/1315245.1315287}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaldermanW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaleviK07, author = {Shai Halevi and Hugo Krawczyk}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Security under key-dependent inputs}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {466--475}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315303}, doi = {10.1145/1315245.1315303}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaleviK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HohGXA07, author = {Baik Hoh and Marco Gruteser and Hui Xiong and Ansaf Alrabady}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Preserving privacy in gps traces via uncertainty-aware path cloaking}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {161--171}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315266}, doi = {10.1145/1315245.1315266}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HohGXA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HopperVC07, author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan{-}Tin}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {How much anonymity does network latency leak?}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {82--91}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315257}, doi = {10.1145/1315245.1315257}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HopperVC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JacksonBBSB07, author = {Collin Jackson and Adam Barth and Andrew Bortz and Weidong Shao and Dan Boneh}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Protecting browsers from dns rebinding attacks}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {421--431}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315298}, doi = {10.1145/1315245.1315298}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JacksonBBSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JareckiKT07, author = {Stanislaw Jarecki and Jihye Kim and Gene Tsudik}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Robust group key agreement using short broadcasts}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {411--420}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315296}, doi = {10.1145/1315245.1315296}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JareckiKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiangWX07, author = {Xuxian Jiang and Xinyuan Wang and Dongyan Xu}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {128--138}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315262}, doi = {10.1145/1315245.1315262}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiangWX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsK07, author = {Ari Juels and Burton S. Kaliski Jr.}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Pors: proofs of retrievability for large files}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {584--597}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315317}, doi = {10.1145/1315245.1315317}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarlofSTW07, author = {Chris Karlof and Umesh Shankar and J. Doug Tygar and David A. Wagner}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Dynamic pharming attacks and locked same-origin policies for web browsers}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {58--71}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315254}, doi = {10.1145/1315245.1315254}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KarlofSTW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KopfB07, author = {Boris K{\"{o}}pf and David A. Basin}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {An information-theoretic model for adaptive side-channel attacks}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {286--296}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315282}, doi = {10.1145/1315245.1315282}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KopfB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Lesniewski-LaasFSMK07, author = {Chris Lesniewski{-}Laas and Bryan Ford and Jacob Strauss and Robert Tappan Morris and M. Frans Kaashoek}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Alpaca: extensible authorization for distributed services}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {432--444}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315299}, doi = {10.1145/1315245.1315299}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Lesniewski-LaasFSMK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiLLLC07, author = {Fengjun Li and Bo Luo and Peng Liu and Dongwon Lee and Chao{-}Hsien Chu}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Automaton segmentation: a new approach to preserve privacy in xml information brokering}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {508--518}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315308}, doi = {10.1145/1315245.1315308}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiLLLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LibertQY07, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Forward-secure signatures in untrusted update environments: efficient and generic constructions}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {266--275}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315279}, doi = {10.1145/1315245.1315279}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LibertQY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Lipner07, author = {Steven B. Lipner}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Assurance and evaluation: what next?}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {1}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315246}, doi = {10.1145/1315245.1315246}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Lipner07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MitraPGG07, author = {Bivas Mitra and Fernando Peruani and Sujoy Ghose and Niloy Ganguly}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Analyzing the vulnerability of superpeer networks against attack}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {225--234}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315274}, doi = {10.1145/1315245.1315274}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MitraPGG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoranN07, author = {Tal Moran and Moni Naor}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Split-ballot voting: everlasting privacy with distributed trust}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {246--255}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315277}, doi = {10.1145/1315245.1315277}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoranN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NeuhausZHZ07, author = {Stephan Neuhaus and Thomas Zimmermann and Christian Holler and Andreas Zeller}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Predicting vulnerable software components}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {529--540}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315311}, doi = {10.1145/1315245.1315311}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NeuhausZHZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OstrovskySW07, author = {Rafail Ostrovsky and Amit Sahai and Brent Waters}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Attribute-based encryption with non-monotonic access structures}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {195--203}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315270}, doi = {10.1145/1315245.1315270}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OstrovskySW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PetroniH07, author = {Nick L. Petroni Jr. and Michael W. Hicks}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Automated detection of persistent kernel control-flow attacks}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {103--115}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315260}, doi = {10.1145/1315245.1315260}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PetroniH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PonecGBW07, author = {Miroslav Ponec and Paul Giura and Herv{\'{e}} Br{\"{o}}nnimann and Joel Wein}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Highly efficient techniques for network forensics}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {150--160}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315265}, doi = {10.1145/1315245.1315265}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PonecGBW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RamachandranFV07, author = {Anirudh Ramachandran and Nick Feamster and Santosh S. Vempala}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Filtering spam with behavioral blacklisting}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {342--351}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315288}, doi = {10.1145/1315245.1315288}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RamachandranFV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RogawayB07, author = {Phillip Rogaway and Mihir Bellare}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Robust computational secret sharing and a unified account of classical secret-sharing goals}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {172--184}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315268}, doi = {10.1145/1315245.1315268}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RogawayB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SezerNKX07, author = {Emre Can Sezer and Peng Ning and Chongkyung Kil and Jun Xu}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Memsherlock: an automated debugger for unknown memory corruption vulnerabilities}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {562--572}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315314}, doi = {10.1145/1315245.1315314}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SezerNKX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Shacham07, author = {Hovav Shacham}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86)}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {552--561}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315313}, doi = {10.1145/1315245.1315313}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Shacham07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SongLSKS07, author = {Yingbo Song and Michael E. Locasto and Angelos Stavrou and Angelos D. Keromytis and Salvatore J. Stolfo}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {On the infeasibility of modeling polymorphic shellcode}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {541--551}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315312}, doi = {10.1145/1315245.1315312}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SongLSKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StollerYRG07, author = {Scott D. Stoller and Ping Yang and C. R. Ramakrishnan and Mikhail I. Gofman}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Efficient policy analysis for administrative role based access control}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {445--455}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315300}, doi = {10.1145/1315245.1315300}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/StollerYRG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Troncoso-PastorizaKC07, author = {Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Stefan Katzenbeisser and Mehmet Utku Celik}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Privacy preserving error resilient dna searching through oblivious automata}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {519--528}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315309}, doi = {10.1145/1315245.1315309}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Troncoso-PastorizaKC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TsangAKS07, author = {Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean W. Smith}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Blacklistable anonymous credentials: blocking misbehaving users without ttps}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {72--81}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315256}, doi = {10.1145/1315245.1315256}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TsangAKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YinSEKK07, author = {Heng Yin and Dawn Xiaodong Song and Manuel Egele and Christopher Kruegel and Engin Kirda}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Panorama: capturing system-wide information flow for malware detection and analysis}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {116--127}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315261}, doi = {10.1145/1315245.1315261}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YinSEKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZageN07, author = {David John Zage and Cristina Nita{-}Rotaru}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {On the accuracy of decentralized virtual coordinate systems in adversarial networks}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {214--224}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315273}, doi = {10.1145/1315245.1315273}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZageN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangJB07, author = {Lei Zhang and Sushil Jajodia and Alexander Brodsky}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Information disclosure under realistic assumptions: privacy versus optimality}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {573--583}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315316}, doi = {10.1145/1315245.1315316}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangJB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2007, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-703-2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.