[{"title":"(50个子文件82.08MB)CCS2017下.rar","children":[{"title":"CCS2017下","children":[{"title":"PracticalSecureAggregationforPrivacy-PreservingMachineLearning.pdf <span style='color:#111;'>1.69MB</span>","children":null,"spread":false},{"title":"QuantifyingthePressureofLegalRisksonThird-partyVulnerabilityResearch.pdf <span style='color:#111;'>1.85MB</span>","children":null,"spread":false},{"title":"TheReturnofCoppersmith’sAttackPracticalFactorizationofWidelyUsedRSAModuli.pdf <span style='color:#111;'>1.83MB</span>","children":null,"spread":false},{"title":"RAINRefinableAttackInvestigationwithOn-demandInter-ProcessInformationFlowTracking.pdf <span style='color:#111;'>1.52MB</span>","children":null,"spread":false},{"title":"PtrSplitSupportinggeneralpointersinautomaticprogrampartitioning.pdf <span style='color:#111;'>1.54MB</span>","children":null,"spread":false},{"title":"SolidusConfidentialDistributedLedgerTransactionsviaPVORM.pdf <span style='color:#111;'>1.32MB</span>","children":null,"spread":false},{"title":"TheDynamicsofInnocentFleshontheBoneCodeReuseTenYearsLater.pdf <span style='color:#111;'>1.34MB</span>","children":null,"spread":false},{"title":"Post-QuantumZero-KnowledgeandSignaturesfromSymmetric-KeyPrimitives.pdf <span style='color:#111;'>1.41MB</span>","children":null,"spread":false},{"title":"TKeySecond-FactorAuthenticationFromSecureHashChains.pdf <span style='color:#111;'>1.50MB</span>","children":null,"spread":false},{"title":"SynthesisofProbabilisticPrivacyEnforcement.pdf <span style='color:#111;'>1.45MB</span>","children":null,"spread":false},{"title":"RiseoftheHaCRSAugmentingAutonomousCyberReasoningSystemswithHumanAssistance.pdf <span style='color:#111;'>1.17MB</span>","children":null,"spread":false},{"title":"TinyOLEEfficientActivelySecureTwo-PartyComputationfromObliviousLinearFunctionEvaluation.pdf <span style='color:#111;'>1.31MB</span>","children":null,"spread":false},{"title":"UsePrivacyinData-DrivenSystemsTheoryandExperimentswithMachineLearntPrograms.pdf <span style='color:#111;'>1.58MB</span>","children":null,"spread":false},{"title":"VulnerableImplicitServiceARevisit.pdf <span style='color:#111;'>1.19MB</span>","children":null,"spread":false},{"title":"WatchMebutDon’tTouchMeContactlessControlFlowMonitoringviaElectromagneticEmanations.pdf <span style='color:#111;'>4.73MB</span>","children":null,"spread":false},{"title":"TheTypTopSystemPersonalizedTypo-tolerantPasswordChecking.pdf <span style='color:#111;'>1.20MB</span>","children":null,"spread":false},{"title":"TheWaterfallofLibertyDecoyRoutingCircumventionthatResistsRoutingAttacks.pdf <span style='color:#111;'>1.70MB</span>","children":null,"spread":false},{"title":"SemFuzzSemantics-basedAutomaticGenerationofProof-of-Concept Exploits.pdf <span style='color:#111;'>1.96MB</span>","children":null,"spread":false},{"title":"VerifyingSecurityPoliciesinMulti-agentWorkflowswithLoops.pdf <span style='color:#111;'>1.16MB</span>","children":null,"spread":false},{"title":"RewritingHistoryChangingtheArchivedWebfromthePresent.pdf <span style='color:#111;'>1.78MB</span>","children":null,"spread":false},{"title":"UnleashingtheWalkingDeadUnderstandingCross-AppRemoteInfectionsonMobileWebViews.pdf <span style='color:#111;'>1.87MB</span>","children":null,"spread":false},{"title":"PredictingtheRiskofCyberIncidents.pdf <span style='color:#111;'>1.32MB</span>","children":null,"spread":false},{"title":"SlowFuzzAutomatedDomain-IndependentDetectionofAlgorithmicComplexityVulnerabilities.pdf <span style='color:#111;'>1.06MB</span>","children":null,"spread":false},{"title":"SGX-BigMatrixAPracticalEncryptedDataAnalyticFrameworkWithTrustedProcessors.pdf <span style='color:#111;'>1.35MB</span>","children":null,"spread":false},{"title":"TailAttacksonWebApplications.pdf <span style='color:#111;'>1.28MB</span>","children":null,"spread":false},{"title":"ReviveRebalancingOff-BlockchainPaymentNetworks.pdf <span style='color:#111;'>1.20MB</span>","children":null,"spread":false},{"title":"Provably-SecureLogicLockingFromTheoryToPractice.pdf <span style='color:#111;'>7.94MB</span>","children":null,"spread":false},{"title":"PracticalUC-SecureDelegatableCredentialswithAttributesandTheirApplicationtoBlockchain.pdf <span style='color:#111;'>1.40MB</span>","children":null,"spread":false},{"title":"PracticalAttacksAgainstGraph-basedClustering.pdf <span style='color:#111;'>1.81MB</span>","children":null,"spread":false},{"title":"WhyDoDevelopersGetPasswordStorageWrongAQualitativeUsabilityStudy.pdf <span style='color:#111;'>2.36MB</span>","children":null,"spread":false},{"title":"WheretheWildWarningsAreRootCausesofChromeHTTPSCertificateErrors.pdf <span style='color:#111;'>1.20MB</span>","children":null,"spread":false},{"title":"PresenceAttestationTheMissingLinkInDynamicTrustBootstrapping.pdf <span style='color:#111;'>2.05MB</span>","children":null,"spread":false},{"title":"TheWolfofNameStreetHijackingDomainsThroughTheirNameservers.pdf <span style='color:#111;'>1.49MB</span>","children":null,"spread":false},{"title":"StaccoDifferentiallyAnalyzingSide-ChannelTracesforDetectingSSLTLSVulnerabilitiesinSecureEnclaves.pdf <span style='color:#111;'>1.36MB</span>","children":null,"spread":false},{"title":"Zero-KnowledgeContingentPaymentsRevisitedAttacksandPaymentsforServices.pdf <span style='color:#111;'>1.22MB</span>","children":null,"spread":false},{"title":"Side-ChannelAttacksonBLISSLattice-BasedSignaturesExploitingBranchTracingAgainststrongSwanandElectromagneticEmanationsinMicrocontrollers.pdf <span style='color:#111;'>1.77MB</span>","children":null,"spread":false},{"title":"ToBLISS-Bornottobe-AttackingstrongSwan’sImplementationofPost-QuantumSignatures.pdf <span style='color:#111;'>1.29MB</span>","children":null,"spread":false},{"title":"S3ORAMAComputation-EfficientandConstantClientBandwidthBlowupORAMwithShamirSecretSharing.pdf <span style='color:#111;'>1.60MB</span>","children":null,"spread":false},{"title":"walk2friendsInferringSocialLinksfromMobilityProfiles.pdf <span style='color:#111;'>2.28MB</span>","children":null,"spread":false},{"title":"PracticalGraphsforOptimalSide-ChannelResistantMemory-HardFunctions.pdf <span style='color:#111;'>1.33MB</span>","children":null,"spread":false},{"title":"QueryingforQueriesIndexesofQueriesforEfficientandExpressiveIT-PIR.pdf <span style='color:#111;'>1.37MB</span>","children":null,"spread":false},{"title":"VibWriteTowardsFinger-inputAuthenticationonUbiquitousSurfacesviaPhysicalVibration.pdf <span style='color:#111;'>3.42MB</span>","children":null,"spread":false},{"title":"PreciseDetectionofSide-ChannelVulnerabilitiesusingQuantitativeCartesianHoareLogic.pdf <span style='color:#111;'>1.34MB</span>","children":null,"spread":false},{"title":"VerifiedCorrectnessandSecurityofmbedTLSHMAC-DRBG.pdf <span style='color:#111;'>1.17MB</span>","children":null,"spread":false},{"title":"ScalingORAMforSecureComputation.pdf <span style='color:#111;'>2.13MB</span>","children":null,"spread":false},{"title":"TheARTofAppCompartmentalizationCompiler-basedLibraryPrivilegeSeparationonStockAndroid.pdf <span style='color:#111;'>1.17MB</span>","children":null,"spread":false},{"title":"StandardizingBadCryptographicPractice-AteardownoftheIEEEstandardforprotectingelectronic-designintellectualproperty.pdf <span style='color:#111;'>1.86MB</span>","children":null,"spread":false},{"title":"PracticalMulti-partyPrivateSetIntersectionfromSymmetric-KeyTechniques.pdf <span style='color:#111;'>1.24MB</span>","children":null,"spread":false},{"title":"VidenAttackerIdentificationonIn-VehicleNetworks.pdf <span style='color:#111;'>1.66MB</span>","children":null,"spread":false},{"title":"PracticalQuantum-SafeVotingfromLattices.pdf <span style='color:#111;'>1.33MB</span>","children":null,"spread":false}],"spread":false}],"spread":true}]