Sciweavers

CCS
2015
ACM
9 years 8 months ago
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications
A privacy policy is a statement informing users how their information will be collected, used, and disclosed. Failing to provide a correct privacy policy may result in a fine. Ho...
Le Yu, Tao Zhang, Xiapu Luo, Lei Xue
ACISP
2015
Springer
9 years 8 months ago
VisRAID: Visualizing Remote Access for Intrusion Detection
Detecting malicious attempts to access computers is difficult with current security applications. Many current applications do not give the user the right information to find and ...
Leliel Trethowen, Craig Anslow, Stuart Marshall, I...
CCS
2015
ACM
9 years 8 months ago
Constant Communication ORAM with Small Blocksize
There have been several attempts recently at using homomorphic encryption to increase the efficiency of Oblivious RAM protocols. One of the most successful has been Onion ORAM, w...
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass
ACSAC
2015
IEEE
9 years 8 months ago
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques. A unique identifier is created based on characte...
Thomas Hupperich, Davide Maiorca, Marc Kührer...
CCS
2015
ACM
9 years 8 months ago
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
In this paper, we study Password Authenticated Key Exchange (PAKE) in a group. First, we present a generic “fairy-ring dance” construction that transforms any secure two-party...
Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahan...
Security Privacy
Top of PageReset Settings