Sciweavers

63 search results - page 1 / 13
» ccs 2011
Sort
View
CCS
2011
ACM
12 years 4 months ago
Ciphers that securely encipher their own keys
Mihir Bellare, David Cash, Sriram Keelveedhi
CCS
2011
ACM
12 years 4 months ago
Unicorn: two-factor attestation for data security
Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, Da...
CCS
2011
ACM
12 years 4 months ago
App isolation: get the security of multiple browsers with just one
Eric Yawei Chen, Jason Bau, Charles Reis, Adam Bar...
CCS
2011
ACM
12 years 4 months ago
iSpy: automatic reconstruction of typed input from compromising reflections
Rahul Raguram, Andrew M. White 0002, Dibyendusekha...
CCS
2011
ACM
12 years 4 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka