首页 安全技术 网络安全     /    CCS2017下.rar

CCS2017下.rar

上传者: var19951121 | 上传时间:2021/2/15 19:33:18 | 文件大小:82.08MB | 文件类型:rar
CCS2017下.rar
ACM计算机与通信安全会议(CCS,ACMConferenceonComputerandCommunicationsSecurity)属于CCFA类会议,行业四大会议之一。
由于2017年的文章太多,因而分为2部分。
本软件ID:11645111

文件下载

资源详情

[{"title":"(50个子文件82.08MB)CCS2017下.rar","children":[{"title":"CCS2017下","children":[{"title":"PracticalSecureAggregationforPrivacy-PreservingMachineLearning.pdf <span style='color:#111;'>1.69MB</span>","children":null,"spread":false},{"title":"QuantifyingthePressureofLegalRisksonThird-partyVulnerabilityResearch.pdf <span style='color:#111;'>1.85MB</span>","children":null,"spread":false},{"title":"TheReturnofCoppersmith&rsquo;sAttackPracticalFactorizationofWidelyUsedRSAModuli.pdf <span style='color:#111;'>1.83MB</span>","children":null,"spread":false},{"title":"RAINRefinableAttackInvestigationwithOn-demandInter-ProcessInformationFlowTracking.pdf <span style='color:#111;'>1.52MB</span>","children":null,"spread":false},{"title":"PtrSplitSupportinggeneralpointersinautomaticprogrampartitioning.pdf <span style='color:#111;'>1.54MB</span>","children":null,"spread":false},{"title":"SolidusConfidentialDistributedLedgerTransactionsviaPVORM.pdf <span style='color:#111;'>1.32MB</span>","children":null,"spread":false},{"title":"TheDynamicsofInnocentFleshontheBoneCodeReuseTenYearsLater.pdf <span style='color:#111;'>1.34MB</span>","children":null,"spread":false},{"title":"Post-QuantumZero-KnowledgeandSignaturesfromSymmetric-KeyPrimitives.pdf <span style='color:#111;'>1.41MB</span>","children":null,"spread":false},{"title":"TKeySecond-FactorAuthenticationFromSecureHashChains.pdf <span style='color:#111;'>1.50MB</span>","children":null,"spread":false},{"title":"SynthesisofProbabilisticPrivacyEnforcement.pdf <span style='color:#111;'>1.45MB</span>","children":null,"spread":false},{"title":"RiseoftheHaCRSAugmentingAutonomousCyberReasoningSystemswithHumanAssistance.pdf <span style='color:#111;'>1.17MB</span>","children":null,"spread":false},{"title":"TinyOLEEfficientActivelySecureTwo-PartyComputationfromObliviousLinearFunctionEvaluation.pdf <span style='color:#111;'>1.31MB</span>","children":null,"spread":false},{"title":"UsePrivacyinData-DrivenSystemsTheoryandExperimentswithMachineLearntPrograms.pdf <span style='color:#111;'>1.58MB</span>","children":null,"spread":false},{"title":"VulnerableImplicitServiceARevisit.pdf <span style='color:#111;'>1.19MB</span>","children":null,"spread":false},{"title":"WatchMebutDon&rsquo;tTouchMeContactlessControlFlowMonitoringviaElectromagneticEmanations.pdf <span style='color:#111;'>4.73MB</span>","children":null,"spread":false},{"title":"TheTypTopSystemPersonalizedTypo-tolerantPasswordChecking.pdf <span style='color:#111;'>1.20MB</span>","children":null,"spread":false},{"title":"TheWaterfallofLibertyDecoyRoutingCircumventionthatResistsRoutingAttacks.pdf <span style='color:#111;'>1.70MB</span>","children":null,"spread":false},{"title":"SemFuzzSemantics-basedAutomaticGenerationofProof-of-Concept&nbsp;Exploits.pdf <span style='color:#111;'>1.96MB</span>","children":null,"spread":false},{"title":"VerifyingSecurityPoliciesinMulti-agentWorkflowswithLoops.pdf <span style='color:#111;'>1.16MB</span>","children":null,"spread":false},{"title":"RewritingHistoryChangingtheArchivedWebfromthePresent.pdf <span style='color:#111;'>1.78MB</span>","children":null,"spread":false},{"title":"UnleashingtheWalkingDeadUnderstandingCross-AppRemoteInfectionsonMobileWebViews.pdf <span style='color:#111;'>1.87MB</span>","children":null,"spread":false},{"title":"PredictingtheRiskofCyberIncidents.pdf <span style='color:#111;'>1.32MB</span>","children":null,"spread":false},{"title":"SlowFuzzAutomatedDomain-IndependentDetectionofAlgorithmicComplexityVulnerabilities.pdf <span style='color:#111;'>1.06MB</span>","children":null,"spread":false},{"title":"SGX-BigMatrixAPracticalEncryptedDataAnalyticFrameworkWithTrustedProcessors.pdf <span style='color:#111;'>1.35MB</span>","children":null,"spread":false},{"title":"TailAttacksonWebApplications.pdf <span style='color:#111;'>1.28MB</span>","children":null,"spread":false},{"title":"ReviveRebalancingOff-BlockchainPaymentNetworks.pdf <span style='color:#111;'>1.20MB</span>","children":null,"spread":false},{"title":"Provably-SecureLogicLockingFromTheoryToPractice.pdf <span style='color:#111;'>7.94MB</span>","children":null,"spread":false},{"title":"PracticalUC-SecureDelegatableCredentialswithAttributesandTheirApplicationtoBlockchain.pdf <span style='color:#111;'>1.40MB</span>","children":null,"spread":false},{"title":"PracticalAttacksAgainstGraph-basedClustering.pdf <span style='color:#111;'>1.81MB</span>","children":null,"spread":false},{"title":"WhyDoDevelopersGetPasswordStorageWrongAQualitativeUsabilityStudy.pdf <span style='color:#111;'>2.36MB</span>","children":null,"spread":false},{"title":"WheretheWildWarningsAreRootCausesofChromeHTTPSCertificateErrors.pdf <span style='color:#111;'>1.20MB</span>","children":null,"spread":false},{"title":"PresenceAttestationTheMissingLinkInDynamicTrustBootstrapping.pdf <span style='color:#111;'>2.05MB</span>","children":null,"spread":false},{"title":"TheWolfofNameStreetHijackingDomainsThroughTheirNameservers.pdf <span style='color:#111;'>1.49MB</span>","children":null,"spread":false},{"title":"StaccoDifferentiallyAnalyzingSide-ChannelTracesforDetectingSSLTLSVulnerabilitiesinSecureEnclaves.pdf <span style='color:#111;'>1.36MB</span>","children":null,"spread":false},{"title":"Zero-KnowledgeContingentPaymentsRevisitedAttacksandPaymentsforServices.pdf <span style='color:#111;'>1.22MB</span>","children":null,"spread":false},{"title":"Side-ChannelAttacksonBLISSLattice-BasedSignaturesExploitingBranchTracingAgainststrongSwanandElectromagneticEmanationsinMicrocontrollers.pdf <span style='color:#111;'>1.77MB</span>","children":null,"spread":false},{"title":"ToBLISS-Bornottobe-AttackingstrongSwan&rsquo;sImplementationofPost-QuantumSignatures.pdf <span style='color:#111;'>1.29MB</span>","children":null,"spread":false},{"title":"S3ORAMAComputation-EfficientandConstantClientBandwidthBlowupORAMwithShamirSecretSharing.pdf <span style='color:#111;'>1.60MB</span>","children":null,"spread":false},{"title":"walk2friendsInferringSocialLinksfromMobilityProfiles.pdf <span style='color:#111;'>2.28MB</span>","children":null,"spread":false},{"title":"PracticalGraphsforOptimalSide-ChannelResistantMemory-HardFunctions.pdf <span style='color:#111;'>1.33MB</span>","children":null,"spread":false},{"title":"QueryingforQueriesIndexesofQueriesforEfficientandExpressiveIT-PIR.pdf <span style='color:#111;'>1.37MB</span>","children":null,"spread":false},{"title":"VibWriteTowardsFinger-inputAuthenticationonUbiquitousSurfacesviaPhysicalVibration.pdf <span style='color:#111;'>3.42MB</span>","children":null,"spread":false},{"title":"PreciseDetectionofSide-ChannelVulnerabilitiesusingQuantitativeCartesianHoareLogic.pdf <span style='color:#111;'>1.34MB</span>","children":null,"spread":false},{"title":"VerifiedCorrectnessandSecurityofmbedTLSHMAC-DRBG.pdf <span style='color:#111;'>1.17MB</span>","children":null,"spread":false},{"title":"ScalingORAMforSecureComputation.pdf <span style='color:#111;'>2.13MB</span>","children":null,"spread":false},{"title":"TheARTofAppCompartmentalizationCompiler-basedLibraryPrivilegeSeparationonStockAndroid.pdf <span style='color:#111;'>1.17MB</span>","children":null,"spread":false},{"title":"StandardizingBadCryptographicPractice-AteardownoftheIEEEstandardforprotectingelectronic-designintellectualproperty.pdf <span style='color:#111;'>1.86MB</span>","children":null,"spread":false},{"title":"PracticalMulti-partyPrivateSetIntersectionfromSymmetric-KeyTechniques.pdf <span style='color:#111;'>1.24MB</span>","children":null,"spread":false},{"title":"VidenAttackerIdentificationonIn-VehicleNetworks.pdf <span style='color:#111;'>1.66MB</span>","children":null,"spread":false},{"title":"PracticalQuantum-SafeVotingfromLattices.pdf <span style='color:#111;'>1.33MB</span>","children":null,"spread":false}],"spread":false}],"spread":true}]

评论信息

免责申明

【好快吧下载】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【好快吧下载】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【好快吧下载】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,8686821#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明