default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 288 matches
- 2022
- Nikola Jovanovic, Marc Fischer, Samuel Steffen, Martin T. Vechev:
Private and Reliable Neural Network Inference. CCS 2022: 1663-1677 - Amrita Roy Chowdhury, Bolin Ding, Somesh Jha, Weiran Liu, Jingren Zhou:
Strengthening Order Preserving Encryption with Differential Privacy. CCS 2022: 2519-2533 - James Bell, Adrià Gascón, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann:
Distributed, Private, Sparse Histograms in the Two-Server Model. CCS 2022: 307-321 - Amrita Roy Chowdhury, Chuan Guo, Somesh Jha, Laurens van der Maaten:
EIFFeL: Ensuring Integrity for Federated Learning. CCS 2022: 2535-2549 - Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song:
TurboPack: Honest Majority MPC with Constant Online Communication. CCS 2022: 951-964 - Lorenzo Grassi
, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Reinforced Concrete: A Fast Hash Function for Verifiable Computation. CCS 2022: 1323-1335 - Yuan Lu, Zhenliang Lu, Qiang Tang
:
Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT. CCS 2022: 2159-2173 - Jiayuan Ye, Aadyaa Maddi
, Sasi Kumar Murakonda, Vincent Bindschaedler
, Reza Shokri:
Enhanced Membership Inference Attacks against Machine Learning Models. CCS 2022: 3093-3106 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara
, Kan Yasuda:
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES. CCS 2022: 2323-2336 - Dario Fiore, Ida Tucker:
Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams. CCS 2022: 1067-1080 - Andrea Basso
:
Poster: A Post-Quantum Oblivious PRF from Isogenies. CCS 2022: 3327-3329 - Dipanjan Das, Priyanka Bose, Nicola Ruaro
, Christopher Kruegel, Giovanni Vigna:
Understanding Security Issues in the NFT Ecosystem. CCS 2022: 667-681 - Ana-Maria Cretu
, Florimond Houssiau, Antoine Cully, Yves-Alexandre de Montjoye:
QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems. CCS 2022: 623-637 - Ahmad Ibrahim, Hamed Nemati, Till Schlüter, Nils Ole Tippenhauer
, Christian Rossow:
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels. CCS 2022: 1489-1503 - Cong Wu, Jing Chen, Kun He, Ziming Zhao
, Ruiying Du, Chen Zhang:
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. CCS 2022: 2931-2945 - Michael Brenner, Anamaria Costache, Kurt Rohloff:
WAHC'22: 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. CCS 2022: 3531-3532 - Daniel Günther
, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider
, Ajith Suresh:
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs. CCS 2022: 3351-3353 - Jianxin Wei
, Ergute Bao
, Xiaokui Xiao, Yin Yang:
DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling. CCS 2022: 2885-2899 - Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang:
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. CCS 2022: 2841-2855 - Shubham Agarwal
:
Helping or Hindering?: How Browser Extensions Undermine Security. CCS 2022: 23-37 - Yue Zhang
, Zhiqiang Lin:
When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure. CCS 2022: 3181-3194 - Gorka Abad
, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets. CCS 2022: 3315-3317 - Akshit Aggarwal, Srinibas Swain:
Poster: Correctness of n-parties ECDSA By the Claim of Byzantine Agreement. CCS 2022: 3319-3321 - Shweta Agrawal, Elena Kirshanova, Damien Stehlé, Anshu Yadav:
Practical, Round-Optimal Lattice-Based Blind Signatures. CCS 2022: 39-53 - Mingrui Ai, Kaiping Xue
, Bo Luo
, Lutong Chen, Nenghai Yu, Qibin Sun, Feng Wu:
Blacktooth: Breaking through the Defense of Bluetooth in Silence. CCS 2022: 55-68 - Lamya Alkhariji, Suparna De, Omer F. Rana
, Charith Perera:
Poster: Ontology Enabled Chatbot for Applying Privacy by Design in IoT Systems. CCS 2022: 3323-3325 - Joël Alwen, Dominik Hartmann
, Eike Kiltz
, Marta Mularczyk:
Server-Aided Continuous Group Key Agreement. CCS 2022: 69-82 - Yawning Angel, Benjamin Dowling
, Andreas Hülsing, Peter Schwabe, Florian Weber:
Post Quantum Noise. CCS 2022: 97-109 - Diego F. Aranha
, Chuanwei Lin
, Claudio Orlandi, Mark Simkin
:
Laconic Private Set-Intersection From Pairings. CCS 2022: 111-124 - Gilad Asharov
, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida:
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters. CCS 2022: 125-138
skipping 258 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-07-29 09:05 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint