Sciweavers

5119 search results - page 118 / 1024
» Security Privacy
Sort
View
PET
2010
Springer
15 years 7 months ago
Preventing Active Timing Attacks in Low-Latency Anonymous Communication
Joan Feigenbaum, Aaron Johnson, Paul F. Syverson
ESORICS
2007
Springer
15 years 7 months ago
Efficient Password-Based Authenticated Key Exchange Without Public Information
Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
SP
2010
IEEE
419views Security Privacy» more  SP 2010»
15 years 7 months ago
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
Matt Fredrikson, Somesh Jha, Mihai Christodorescu,...
143
Voted
ACSAC
2004
IEEE
15 years 7 months ago
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders
Dick Brackney, Terrance Goan, Allen Ott, Lockheed ...
93
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Detecting Kernel-Level Rootkits Through Binary Analysis
Christopher Krügel, William K. Robertson, Gio...