 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
Compilation
Author Index
Ibrahim,
Ahmad
WiSec'17 ~ DARPA: Device Attestation Resilient
to Physical Attacks
WiSec'17
~ POSTER: Toward a Secure and Scalable Attestation
CCS'16
~ SANA: Secure and Scalable Aggregate Network Attestation
SPRO'16
~ StIns4CS: A State Inspection Tool for C#
Iklody,
Andras
WISCS'16 ~ MISP - The Design and
Implementation of a Collaborative Threat Intelligence Sharing Platform
Ikuse,
Tomonori
CCS'16 ~ POSTER: Static ROP Chain Detection
Based on Hidden Markov Model Considering ROP Chain Integrity
Ilia,
Panagiotis
CODASPY'17 ~ SAMPAC: Socially-Aware collaborative
Multi-Party Access Control
|
| |
Imine,
Abdessamad
WPES'17 ~ Detecting Communities under Differential
Privacy
Imre,
Sándor
WPES'17 ~ An Efficient and Robust Social
Network De-anonymization Attack
Inci,
Mehmet Sinan
ASIA CCS'17 ~ Hit by the Bus: QoS Degradation
Attack on Android
Invernizzi,
Luca
ASIA CCS'17 ~ Gossip: Automatically Identifying
Malicious Domains from Mailing List Discussions
|
| |
Ioannidis,
Sotiris
CODASPY'17 ~ SAMPAC: Socially-Aware collaborative
Multi-Party Access Control
Isaakidis,
Marios
WPES'17 ~ UnlimitID: Privacy-Preserving
Federated Identity Management using Algebraic MACs
Ishai,
Yuval
CCS'16 ~ Function Secret Sharing: Improvements
and Extensions
Ishida,
Ai
ASIA CCS'17 ~ Group Signatures with Time-bound
Keys Revisited: A New Model and an Efficient Construction
Islam,
Md Morshedul
CCS'16 ~ POSTER: A Behavioural Authentication
System for Mobile Users
|
| |
Iwamura,
Makoto
CCS'16 ~ POSTER: Static ROP Chain Detection
Based on Hidden Markov Model Considering ROP Chain Integrity
Izmailov,
Rauf
IWSPA'17 ~ Feature Cultivation in Privileged
Information-augmented Detection
Jaeger,
Trent
SafeConfig'16 ~ Configuring Software and
Systems for Defense-in-Depth
SACMAT'17
~ On Risk in Access Control Enforcement
Jafarian,
Jafar Haadi
MTD'16 ~ Multi-dimensional Host Identity
Anonymization for Defeating Skilled Attackers
Jajodia,
Sushil
MTD'16 ~ A Moving Target Defense Approach
to Disrupting Stealthy Botnets
SafeConfig'16
~ AHEAD: A New Architecture for Active Defense
Jakaria,
A.H.M.
SDN-NFVSec'17 ~ Dynamic DDoS Defense Resource
Allocation using Network Function Virtualization
|
| |
Jakobsen,
Jakob
SPSM'16 ~ On the CCA (in)Security of MTProto
Jana,
Suman
CCS'16 ~ SFADiff: Automated Evasion Attacks
and Fingerprinting Using Black-box Differential Automata Learning
Janc,
Artur
CCS'16 ~ CSP Is Dead, Long Live CSP! On
the Insecurity of Whitelists and the Future of Content Security Policy
Jandl-Scherf,
Bernhard
SafeConfig'16 ~ An Iterative and Toolchain-Based
Approach to Automate Scanning and Mapping Computer Networks
Jang,
Yeongjin
CCS'16 ~ Breaking Kernel Address Space
Layout Randomization with Intel TSX
Janicke,
Helge
SACMAT'17 ~ Poster: Design of an Anomaly-based
Threat Detection & Explication System
|
| |
Jansen,
Kai
ASIA CCS'17 ~ POSTER: Localization of Spoofing
Devices using a Large-scale Air Traffic Surveillance System
Jansen,
Rob
CCS'16 ~ Safely Measuring Tor
Janson,
Christian
SCC'17 ~ Cloud Storage File Recoverability
Jardine,
William
CPS-SPC'16 ~ SENAMI: Selective Non-Invasive
Active Monitoring for ICS Intrusion Detection
Jee,
Kangkook
CCS'16 ~ High Fidelity Data Reduction for
Big Data Security Dependency Analyses
Jeon,
Yuseok
CCS'16 ~ TypeSan: Practical Type Confusion
Detection
|
| |
Jha,
Sadhana
SACMAT'17 ~ Poster: Constrained Policy
Mining in Attribute Based Access Control
Jha,
Sanjay
ASIA CCS'17 ~ WedgeTail: An Intrusion Prevention
System for the Data Plane of Software Defined Networks
Jha,
Somesh
ASIA CCS'17 ~ Practical Black-Box Attacks
against Machine Learning
ASIA
CCS'17 ~ Secure Integration of Web Content and Applications on
Commodity Mobile Operating Systems
Ji,
Shouling
CCS'16 ~ SmartWalk: Enhancing Social Network
Security via Adaptive Random Walks
Jia,
Dingding
APKC'17 ~ KDM and Selective Opening Secure
IBE Based on the LWE Problem
Jia,
Xiaohua
ASIA CCS'17 ~ EncKV: An Encrypted Key-value
Store with Rich Queries
|
| |
Jia,
Yaoqi
CCS'16 ~ "The Web/Local" Boundary Is Fuzzy:
A Security Study of Chrome's Process-based Sandboxing
Jia,
Yunhan Jack
CCS'16 ~ The Misuse of Android Unix Domain
Sockets and Security Implications
Jiang,
Guofei
CCS'16 ~ High Fidelity Data Reduction for
Big Data Security Dependency Analyses
Jiang,
Jian
CCS'16 ~ Host of Troubles: Multiple Host
Ambiguities in HTTP Implementations
Jiang,
Wei
SACMAT'17 ~ Poster: A Location-Privacy
Approach for Continuous Queries
Jiang,
Zoe L.
SCC'17 ~ Secure Dot Product of Outsourced
Encrypted Vectors and its Application to SVM
|
| |
Jin,
Dong
SDN-NFVSec'17 ~ Ultimate Forwarding Resilience
in OpenFlow Networks
Jin,
Hao
CCS'16 ~ MiddlePolice: Toward Enforcing
Destination-Defined Policies in the Middle of the Internet
Jin,
Hongxia
CCS'16 ~ EpicRec: Towards Practical Differentially
Private Framework for Personalized Recommendation
SACMAT'17
~ Secure Pick Up: Implicit Authentication When You Start Using
the Smartphone
Jin,
Jiong
CPSS'17 ~ ViotSOC: Controlling Access to
Dynamically Virtualized IoT Services using Service Object Capability
Jin,
Xiaocong
CCS'16 ~ DPSense: Differentially Private
Crowdsourced Spectrum Sensing
CCS'16
~ iLock: Immediate and Automatic Locking of Mobile Devices against
Data Theft
Jing,
Wenpan
APKC'17 ~ KDM and Selective Opening Secure
IBE Based on the LWE Problem
|
| |
Jo,
Gangwon
CCS'16 ~ PIPSEA: A Practical IPsec Gateway
on Embedded APUs
Johansen,
Christian
CCS'16 ~ DEMO: OffPAD - Offline Personal
Authenticating Device with Applications in Hospitals and e-Banking
Johns,
Martin
CCS'16 ~ POSTER: Mapping the Landscape
of Large-Scale Vulnerability Notifications
Johnson,
Aaron
CCS'16 ~ Safely Measuring Tor
Johnson,
Claiborne
SACMAT'17 ~ Provable Enforcement of HIPAA-Compliant
Release of Medical Records Using the History Aware Programming Language
SACMAT'17
~ Verifiable Assume-Guarantee Privacy Specifications for Actor
Component Architectures
Johnson,
John R.
SafeConfig'16 ~ A Graph-Based Impact Metric
for Mitigating Lateral Movement Cyber Attacks
|
| |
Johnson,
Ryan
MIST'16 ~ Studying Naïve Users and the
Insider Threat with SimpleFlow
Jonker,
Willem
WISCS'16 ~ Private Sharing of IOCs and
Sightings
Joon
Ahn, Gail
CODASPY'17 ~ Deep Android Malware Detection
Jøsang,
Audun
CCS'16 ~ DEMO: OffPAD - Offline Personal
Authenticating Device with Applications in Hospitals and e-Banking
Judmayer,
Aljosha
CCS'16 ~ Condensed Cryptographic Currencies
Crash Course (C5)
Juels,
Ari
CCS'16 ~ The Ring of Gyges: Investigating
the Future of Criminal Smart Contracts
CCS'16
~ Town Crier: An Authenticated Data Feed for Smart Contracts
|
| |
Jung,
Jaeyeon
ASIA CCS'17 ~ Breaking Ad-hoc Runtime Integrity
Protection Mechanisms in Android Financial Apps
Jung,
Wooken
CCS'16 ~ PIPSEA: A Practical IPsec Gateway
on Embedded APUs
Kaafar,
Mohamed Ali
ASIA CCS'17 ~ WedgeTail: An Intrusion Prevention
System for the Data Plane of Software Defined Networks
Kahn,
Michael G.
ABAC'17 ~ Attribute Based Access Control
for Healthcare Resources
Kalodner,
Harry
CCS'16 ~ On the Instability of Bitcoin
without the Block Reward
Kammüller,
Florian
MIST'16 ~ Towards Formal Analysis of Insider
Threats for Auctions
|
| |
Kang,
BooJoong
CODASPY'17 ~ Deep Android Malware Detection
Kannan,
Pravein G.
SDN-NFVSec'17 ~ Enabling SDN Experimentation
in Network Testbeds
Kanonov,
Uri
SPSM'16 ~ Secure Containers in Android:
The Samsung KNOX Case Study
Kantarcioglu,
Murat
CCS'16 ~ Adversarial Data Mining: Big Data
Meets Cyber Security
SCC'17
~ SCC'17 Chairs' Welcome
Kantchelian,
Alex
CCS'16 ~ PREDATOR: Proactive Recognition
and Elimination of Domain Abuse at Time-of-Registration
Kapusta,
Katarzyna
CCS'16 ~ POSTER: A Keyless Efficient Algorithm
for Data Protection by Means of Fragmentation
|
| |
Karafili,
Erisa
SACMAT'17 ~ Enabling Data Sharing in Contextual
Environments: Policy Representation and Analysis
Karame,
Ghassan O.
CCSW'16 ~ On Information Leakage in Deduplicated
Storage Systems
CCS'16
~ On the Security and Performance of Proof of Work Blockchains
CCS'16
~ On the Security and Scalability of Bitcoin's Blockchain
SCC'17
~ Reconciling Security and Functional Requirements in Multi-tenant
Clouds
ASIA
CCS'17 ~ Sharing Proofs of Retrievability across Tenants
BCC'17
~ Towards Scalable and Private Industrial Blockchains
Karande,
Vishal
ASIA CCS'17 ~ SGX-Log: Securing System
Logs with SGX
Kastner,
Wolfgang
MIST'16 ~ Discovering Insider Threats from
Log Data with High-Performance Bioinformatics Tools
Kate,
Aniket
CCS'16 ~ Introduction to Credit Networks:
Security, Privacy, and Applications
Katsikas,
Sokratis K.
CPSS'17 ~ Cyber Security of the Autonomous
Ship
|
| |
Katwala,
Gopi
ABAC'17 ~ Imposing Fine-grain Next Generation
Access Control over Database Queries
Katz,
Jonathan
CCS'16 ~ 5Gen: A Framework for Prototyping
Applications Using Multilinear Maps and Matrix Branching Programs
Katzenbeisser,
Stefan
CCS'16 ~ CCS 2016 General Chair's Welcome
WPES'17
~ Disguised Chromium Browser: Robust Browser, Flash and Canvas
Fingerprinting Protection
WiSec'17
~ Trust the Wire, They Always Told Me! On Practical Non-Destructive
Wire-Tap Attacks Against Ethernet
Kaur,
Jasleen
WiSec'17 ~ Can Android Applications Be
Identified Using Only TCP/IP Headers of Their Launch Time Traffic?
Keidar,
Idit
MIST'16 ~ WatchIT: Who Watches Your IT
Guy?
Kellaris,
Georgios
CCS'16 ~ Generic Attacks on Secure Outsourced
Databases
|
| |
Keller,
Eric
SDN-NFVSec'17 ~ CommunityGuard: A Crowdsourced
Home Cyber-Security System
SDN-NFVSec'17
~ Trusted Click: Overcoming Security issues of NFV in the Cloud
Keller,
Marcel
CCS'16 ~ MASCOT: Faster Malicious Arithmetic
Secure Computation with Oblivious Transfer
Kelly,
Daniel M.
SPRO'16 ~ ROP Gadget Prevalence and Survival
under Compiler-based Binary Diversification Schemes
Keoh,
Sye Loong
CPSS'17 ~ ViotSOC: Controlling Access to
Dynamically Virtualized IoT Services using Service Object Capability
Kerber,
Manfred
MIST'16 ~ Towards Formal Analysis of Insider
Threats for Auctions
Kerik,
Liisi
CCS'16 ~ Alternative Implementations of
Secure Real Numbers
|
| |
Keromytis,
Angelos D.
CCS'16 ~ Protecting Insecure Communications
with Topology-aware Network Tunnels
CCS'16
~ SFADiff: Automated Evasion Attacks and Fingerprinting Using
Black-box Differential Automata Learning
WPES'17
~ That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing
Mechanisms
Kerschbaum,
Florian
CCSW'16 ~ Encrypting Analytical Web Applications
WISCS'16
~ Foreword
CCSW'16
~ Poly-Logarithmic Range Queries on Encrypted Data with Small
Leakage
CCS'16
~ WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative
Security
Khalil,
Issa
CCS'16 ~ Heavy Hitter Estimation over Set-Valued
Data with Local Differential Privacy
Khan,
Latifur
ASIA CCS'17 ~ SGX-Log: Securing System
Logs with SGX
Khandaker,
Mustakimur
ASIA CCS'17 ~ Pinpointing Vulnerabilities
Khanpour,
Hamed
SACMAT'17 ~ Towards a Top-down Policy Engineering
Framework for Attribute-based Access Control
|
| |
Kheir,
Nizar
MIST'16 ~ A Grey-Box Approach for Detecting
Malicious User Interactions in Web Applications
MIST'16
~ A New Risk Assessment Framework Using Graph Theory for Complex
ICT Systems
ASIA
CCS'17 ~ BlindIDS: Market-Compliant and Privacy-Friendly Intrusion
Detection System over Encrypted Traffic
CCS'16
~ PhishEye: Live Monitoring of Sandboxed Phishing Kits
Khoumsi,
Ahmed
CCSW'16 ~ Towards an Efficient Policy Evaluation
Process in Multi-Tenancy Cloud Environments
Kiayias,
Aggelos
CCS'16 ~ Practical Non-Malleable Codes
from l-more Extractable Hash Functions
CCS'16
~ SFADiff: Automated Evasion Attacks and Fingerprinting Using
Black-box Differential Automata Learning
Kiltz,
Eike
CCS'16 ~ On the Provable Security of (EC)DSA
Signatures
Kim,
Hanjun
SACMAT'17 ~ FACT: Functionality-centric
Access Control System for IoT Programming Frameworks
Kim,
Hyoungshick
ASIA CCS'17 ~ Boosting the Guessing Attack
Performance on Android Lock Patterns with Smudge Attacks
CCS'16
~ POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack
|
| |
Kim,
Jihun
SACMAT'17 ~ FACT: Functionality-centric
Access Control System for IoT Programming Frameworks
Kim,
Jong
SACMAT'17 ~ FACT: Functionality-centric
Access Control System for IoT Programming Frameworks
Kim,
Jongkil
ASIA CCS'17 ~ An Efficient KP-ABE with
Short Ciphertexts in Prime OrderGroups under Standard Assumption
Kim,
Suhyun
MIST'16 ~ Analysis on Manipulation of the
MAC Address and Consequent Security Threats
Kim,
Taehun
ASIA CCS'17 ~ Breaking Ad-hoc Runtime Integrity
Protection Mechanisms in Android Financial Apps
Kim,
Taesoo
CCS'16 ~ Breaking Kernel Address Space
Layout Randomization with Intel TSX
CCS'16
~ UniSan: Proactive Kernel Memory Initialization to Eliminate
Data Leakages
|
| |
Kim,
Yongdae
WiSec'17 ~ Dissecting Customized Protocols:
Automatic Analysis for Customized Protocols based on IEEE 802.15.4
Kinder,
Johannes
CODASPY'17 ~ DroidSieve: Fast and Accurate
Classification of Obfuscated Android Malware
King,
William P.
CCS'16 ~ Leave Your Phone at the Door:Side
Channels that Reveal Factory Floor Secrets
Kinkelin,
Holger
WISCS'16 ~ Collaborative Incident Handling
Based on the Blackboard-Pattern
Kirchler,
Matthias
AISec'16 ~ Tracked Without a Trace: Linking
Sessions of Users by Unsupervised Learning of Patterns in Their DNS
Traffic
Kitamura,
Takuya
APKC'17 ~ One-time Programs with Cloud
Storage and Its Application to Electronic Money
|
| |
Klapper,
Patrick
WiSec'17 ~ Trust the Wire, They Always
Told Me! On Practical Non-Destructive Wire-Tap Attacks Against Ethernet
Klebanov,
Vladimir
CCS'16 ~ Practical Detection of Entropy
Loss in Pseudo-Random Number Generators
Kleinmann,
Amit
CPS-SPC'16 ~ Automatic Construction of
Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via
Spectral Analysis
Klick,
Johannes
CCS'16 ~ POSTER: Towards Highly Interactive
Honeypots for Industrial Control Systems
Kloft,
Marius
AISec'16 ~ Tracked Without a Trace: Linking
Sessions of Users by Unsupervised Learning of Patterns in Their DNS
Traffic
Klonowski,
Marek
ASIA CCS'17 ~ Towards Extending Noiseless
Privacy - Dependent Data and More Practical Approach
|
| |
Klose,
Robin
SPSM'16 ~ Analyzing TETRA Location Privacy
and Network Availability
Kluczniak,
Kamil
APKC'17 ~ Two-Move and Setup-Free Blind
Signatures with Perfect Blindness
Ko,
Hajoon
CPSS'17 ~ ViotSOC: Controlling Access to
Dynamically Virtualized IoT Services using Service Object Capability
Kobeissi,
Nadim
PLAS'16 ~ Formal Verification of Smart
Contracts: Short Paper
Koch,
William
MTD'16 ~ Markov Modeling of Moving Target
Defense Games
ASIA
CCS'17 ~ PAYBREAK: Defense Against Cryptographic Ransomware
Kohls,
Katharina Siobhan
ASIA CCS'17 ~ POSTER: Traffic Analysis
Attacks in Anonymity Networks
|
| |
Kohlweiss,
Markulf
CCS'16 ~ Hash First, Argue Later: Adaptive
Verifiable Computations on Outsourced Data
Kolesnikov,
Vladimir
CCS'16 ~ Attribute-based Key Exchange with
General Policies
CCS'16
~ Efficient Batched Oblivious PRF with Applications to Private
Set Intersection
Koller,
Ben
MTD'16 ~ Automated Effectiveness Evaluation
of Moving Target Defenses: Metrics for Missions and Attacks
Kollios,
George
CCS'16 ~ Generic Attacks on Secure Outsourced
Databases
Kolodenker,
Eugene
ASIA CCS'17 ~ PAYBREAK: Defense Against
Cryptographic Ransomware
Kongsgård,
Kyrre W.
IWSPA'17 ~ An Internal/Insider Threat Score
for Data Loss Prevention and Detection
|
| |
Konstantinou,
Charalambos
CPS-SPC'16 ~ A Case Study on Implementing
False Data Injection Attacks Against Nonlinear State Estimation
Kontaxis,
Georgios
CCS'16 ~ Protecting Insecure Communications
with Topology-aware Network Tunnels
Korak,
Thomas
TIS'16 ~ Domain-Oriented Masking: Compact
Masked Hardware Implementations with Arbitrary Protection Order
WiSec'17
~ Exploiting Data-Usage Statistics for Website Fingerprinting
Attacks on Android
Kosba,
Ahmed
CCS'16 ~ The Ring of Gyges: Investigating
the Future of Criminal Smart Contracts
Kostiainen,
Kari
CODASPY'17 ~ Detecting Mobile Application
Spoofing Attacks by Leveraging User Visual Similarity Perception
SPSM'16
~ Hardened Setup of Personalized Security Indicators to Counter
Phishing Attacks in Mobile Banking
Kowalski,
Robin
IWSPA'17 ~ MCDefender: Toward Effective
Cyberbullying Defense in Mobile Online Social Networks
|
| |
Krämer,
Benjamin
SPRO'16 ~ VOT4CS: A Virtualization Obfuscation
Tool for C#
Krämer,
Martin
CCS'16 ~ POSTER: Weighing in eHealth Security:
A Security and Privacy Study of Smart Scales
Kranch,
Michael
CODASPY'17 ~ Identifying HTTPS-Protected
Netflix Videos in Real-Time
Krawczyk,
Hugo
CCS'16 ~ A Unilateral-to-Mutual Authentication
Compiler for Key Exchange (with Applications to Client Authentication
in TLS 1.3)
CCS'16
~ Attribute-based Key Exchange with General Policies
Krips,
Toomas
CCS'16 ~ Alternative Implementations of
Secure Real Numbers
Krishnamurthi,
Shriram
SPSM'16 ~ On a (Per)Mission: Building Privacy
Into the App Marketplace
|
| |
Krishnamurthy,
Srikanth V.
MIST'16 ~ Cyber Deception: Virtual Networks
to Defend Insider Reconnaissance
Krishnan,
Ram
ABAC'17 ~ Attribute Transformation for
Attribute-Based Access Control
ABAC'17
~ Foreword
Krol,
Kat
WPES'17 ~ Control versus Effort in Privacy
Warnings for Webforms
Kross,
Sean
CCS'16 ~ How I Learned to be Secure: A
Census-Representative Survey of Security Advice Sources and Behavior
Krotofil,
Marina
CPS-SPC'16 ~ Achieving ICS Resilience and
Security through Granular Data Flow Management
CPSS'17
~ Cyber-Physical System Discovery - Reverse Engineering Physical
Processes
Kruegel,
Christopher
CCS'16 ~ CCS 2016 Program Chairs' Welcome
ASIA
CCS'17 ~ Gossip: Automatically Identifying Malicious Domains
from Mailing List Discussions
|
| |
Krupp,
Johannes
CCS'16 ~ Identifying the Scan and Attack
Infrastructures Behind Amplification DDoS Attacks
Krzywiecki,
Łukasz
SCC'17 ~ Security of Okamoto Identification
Scheme - A Defense against Ephemeral Key Leakage and Setup
Kuczenski,
Brandon
CODASPY'17 ~ Towards Practical Privacy-Preserving
Life Cycle Assessment Computations
Kulatova,
Natalia
PLAS'16 ~ Formal Verification of Smart
Contracts: Short Paper
Kumar,
Amrit
CODASPY'17 ~ Decompression Quines and Anti-Viruses
Kumar,
Nikash
SDN-NFVSec'17 ~ Dynamic Defense Provision
via Network Functions Virtualization
|
| |
Kumaraguru,
Ponnurangam
SPSM'16 ~ Exploiting Phone Numbers and
Cross-Application Features in Targeted Mobile Attacks
Kumaresan,
Ranjit
CCS'16 ~ Amortizing Secure Computation
with Penalties
CCS'16
~ Efficient Batched Oblivious PRF with Applications to Private
Set Intersection
CCS'16
~ Improvements to Secure Computation with Penalties
Kunihiro,
Noboru
ASIA CCS'17 ~ Mis-operation Resistant Searchable
Homomorphic Encryption
Künnemann,
Robert
CCS'16 ~ Computational Soundness for Dalvik
Bytecode
Küpçü,
Alptekin
CCSW'16 ~ Generic Efficient Dynamic Proofs
of Retrievability
Kusano,
Kosuke
ASIA CCS'17 ~ Privacy-preserving and Optimal
Interval Release for Disease Susceptibility
|
| |
Küsters,
Ralf
CCS'16 ~ A Comprehensive Formal Security
Analysis of OAuth 2.0
Kutylowski,
Miroslaw
SCC'17 ~ Security of Okamoto Identification
Scheme - A Defense against Ephemeral Key Leakage and Setup
Kwag,
Sungsu
ASIA CCS'17 ~ Boosting the Guessing Attack
Performance on Android Lock Patterns with Smudge Attacks
Kwiotek,
Jan-Pascal
SPSM'16 ~ Analyzing TETRA Location Privacy
and Network Availability
|
| |
(Return
to Top to Navigate the SIGSAC 2016-17 Compilation Author Index) |