Sciweavers

63 search results - page 1 / 13
» ccs 2011
Sort
View
CCS
2011
ACM
13 years 10 months ago
Ciphers that securely encipher their own keys
Mihir Bellare, David Cash, Sriram Keelveedhi
CCS
2011
ACM
13 years 10 months ago
Unicorn: two-factor attestation for data security
Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, Da...
CCS
2011
ACM
13 years 10 months ago
App isolation: get the security of multiple browsers with just one
Eric Yawei Chen, Jason Bau, Charles Reis, Adam Bar...
CCS
2011
ACM
13 years 10 months ago
iSpy: automatic reconstruction of typed input from compromising reflections
Rahul Raguram, Andrew M. White 0002, Dibyendusekha...
96
Voted
CCS
2011
ACM
13 years 10 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka