[{"title":"(30个子文件288.77MB)USENIXSecurity2020论文集","children":[{"title":"USENIX-2020-Papers","children":[{"title":"Session#21-SideChannelAttacks.pdf <span style='color:#111;'>9.42MB</span>","children":null,"spread":false},{"title":"Session#6-TrustedExecutionEnvironments1.pdf <span style='color:#111;'>5.81MB</span>","children":null,"spread":false},{"title":"Session#29-Blockchains.pdf <span style='color:#111;'>8.77MB</span>","children":null,"spread":false},{"title":"Session#16-FinancialTechandVoting.pdf <span style='color:#111;'>19.24MB</span>","children":null,"spread":false},{"title":"Session#4-Mobile1.pdf <span style='color:#111;'>8.69MB</span>","children":null,"spread":false},{"title":"Session#7-NetworkSecurity.pdf <span style='color:#111;'>10.77MB</span>","children":null,"spread":false},{"title":"Session#22-ImplementationsofCrypto.pdf <span style='color:#111;'>3.79MB</span>","children":null,"spread":false},{"title":"Session#25-Mobile2andMalware.pdf <span style='color:#111;'>5.85MB</span>","children":null,"spread":false},{"title":"Session#26-DataSecuritySecureComputation.pdf <span style='color:#111;'>6.24MB</span>","children":null,"spread":false},{"title":"Session#2-HumanFactors.pdf <span style='color:#111;'>13.85MB</span>","children":null,"spread":false},{"title":"Session#11-PrivacyEnhancingTechnologies.pdf <span style='color:#111;'>9.44MB</span>","children":null,"spread":false},{"title":"Session#27-Fuzzing2.pdf <span style='color:#111;'>14.14MB</span>","children":null,"spread":false},{"title":"Session#28-VoiceandSpeech.pdf <span style='color:#111;'>19.68MB</span>","children":null,"spread":false},{"title":"Session#17-MachineLearning2.pdf <span style='color:#111;'>9.28MB</span>","children":null,"spread":false},{"title":"Session#18-SystemsSecurity.pdf <span style='color:#111;'>5.11MB</span>","children":null,"spread":false},{"title":"Session#13-EmbeddedIoTSecurity.pdf <span style='color:#111;'>46.50MB</span>","children":null,"spread":false},{"title":"Session#12-SoftwareSecurity.pdf <span style='color:#111;'>6.27MB</span>","children":null,"spread":false},{"title":"Session#24-Fuzzing1.pdf <span style='color:#111;'>8.46MB</span>","children":null,"spread":false},{"title":"Session#5-Phishing,Spam,andThreatIntelligence.pdf <span style='color:#111;'>12.17MB</span>","children":null,"spread":false},{"title":"Session#14-MachineLearning1.pdf <span style='color:#111;'>28.64MB</span>","children":null,"spread":false},{"title":"Session#15-MicroarchitecturalAttacks.pdf <span style='color:#111;'>4.83MB</span>","children":null,"spread":false},{"title":"Session#10-AutomotiveandDroneSecurity.pdf <span style='color:#111;'>23.98MB</span>","children":null,"spread":false},{"title":"USENIXSecurity‘20_contents.pdf <span style='color:#111;'>249.93KB</span>","children":null,"spread":false},{"title":"Session#23-Authentication.pdf <span style='color:#111;'>4.94MB</span>","children":null,"spread":false},{"title":"Session#1-WirelessSecurity.pdf <span style='color:#111;'>5.28MB</span>","children":null,"spread":false},{"title":"Session#8-WebSecurityandPrivacy.pdf <span style='color:#111;'>10.22MB</span>","children":null,"spread":false},{"title":"Session#20-SpecificUserPopulations.pdf <span style='color:#111;'>3.71MB</span>","children":null,"spread":false},{"title":"Session#9-TrustedExecutionEnvironments2.pdf <span style='color:#111;'>7.04MB</span>","children":null,"spread":false},{"title":"Session#3-SoftwareSecurityandVerification.pdf <span style='color:#111;'>4.62MB</span>","children":null,"spread":false},{"title":"Session#19-AnalysisofCrypto.pdf <span style='color:#111;'>5.95MB</span>","children":null,"spread":false}],"spread":false}],"spread":true}]