Sciweavers

73
Voted
CCS
2015
ACM
9 years 11 months ago
Entangled Encodings and Data Entanglement
Giuseppe Ateniese, Özgür Dagdelen, Ivan ...
78
Voted
CCS
2015
ACM
9 years 11 months ago
Towards Insider Threat Detection Using Psychophysiological Signals
Insider threat is a great challenge for most organizations in today’s digital world. It has received substantial research attention as a significant source of information secur...
Yassir Hashem, Hassan Takabi, Mohammad GhasemiGol,...
86
Voted
CCS
2015
ACM
9 years 11 months ago
Detecting Clusters of Fake Accounts in Online Social Networks
Fake accounts are a preferred means for malicious users of online social networks to send spam, commit fraud, or otherwise abuse the system. A single malicious actor may create do...
Cao Xiao, David Mandell Freeman, Theodore Hwa
83
Voted
CCS
2015
ACM
9 years 11 months ago
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
Pairing-based cryptography has exploded over the last decade, as this algebraic setting offers good functionality and efficiency. However, there is a huge security gap between ho...
Joseph A. Akinyele, Christina Garman, Susan Hohenb...
71
Voted
CCS
2015
ACM
9 years 11 months ago
Security by Any Other Name: On the Effectiveness of Provider Based Email Security
Email as we use it today makes no guarantees about message integrity, authenticity, or confidentiality. Users must explicitly encrypt and sign message contents using tools like P...
Ian D. Foster, Jon Larson, Max Masich, Alex C. Sno...