default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2003
- Rakesh Agrawal:
Privacy cognizant information systems. CCS 2003: 1- - Luis von Ahn, Andrew Bortz, Nicholas J. Hopper:
k-anonymous message transmission. CCS 2003: 122-130 - William Aiello, John Ioannidis, Patrick D. McDaniel:
Origin authentication in interdomain routing. CCS 2003: 165-178 - Michael Backes, Birgit Pfitzmann, Michael Waidner
:
A composable cryptographic library with nested operations. CCS 2003: 220-230 - Elena Gabriela Barrantes, David H. Ackley, Trek S. Palmer, Darko Stefanovic, Dino Dai Zovi:
Randomized instruction set emulation to disrupt binary code injection attacks. CCS 2003: 281-289 - David A. Basin, Sebastian Mödersheim
, Luca Viganò:
CDiff: a new reduction technique for constraint-based analysis of security protocols. CCS 2003: 335-344 - Johannes Blömer, Martin Otto, Jean-Pierre Seifert:
A new CRT-RSA algorithm secure against bellcore attacks. CCS 2003: 311-320 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval
:
Security proofs for an efficient password-based key exchange. CCS 2003: 241-250 - Jason Crampton:
On permissions, inheritance and role hierarchies. CCS 2003: 85-92 - Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel:
On the performance, feasibility, and use of forward-secure signatures. CCS 2003: 131-144 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Balancing confidentiality and efficiency in untrusted relational DBMSs. CCS 2003: 93-102 - Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney:
A pairwise key pre-distribution scheme for wireless sensor networks. CCS 2003: 42-51 - Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek:
Buffer overrun detection using linear programming and static analysis. CCS 2003: 345-354 - Gene Itkis:
Cryptographic tamper evidence. CCS 2003: 355-364 - Cheng Jin, Haining Wang, Kang G. Shin:
Hop-count filtering: an effective defense against spoofed DDoS traffic. CCS 2003: 30-41 - Ari Juels, Ronald L. Rivest, Michael Szydlo:
The blocker tag: selective blocking of RFID tags for consumer privacy. CCS 2003: 103-111 - Jonathan Katz, Nan Wang:
Efficiency improvements for signature schemes with tight security reductions. CCS 2003: 155-164 - Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld:
DoS protection for UDP-based protocols. CCS 2003: 2-7 - Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis:
Countering code-injection attacks with instruction-set randomization. CCS 2003: 272-280 - Christopher Krügel, Giovanni Vigna:
Anomaly detection of web-based attacks. CCS 2003: 251-261 - Cullen Linn, Saumya K. Debray:
Obfuscation of executable code to improve resistance to static disassembly. CCS 2003: 290-299 - Donggang Liu, Peng Ning:
Establishing pairwise keys in distributed sensor networks. CCS 2003: 52-61 - Donggang Liu, Peng Ning, Kun Sun:
Efficient self-healing group key distribution with revocation capability. CCS 2003: 231-240 - Peng Liu, Wanyu Zang:
Incentive-based modeling and inference of attacker intent, objectives, and strategies. CCS 2003: 179-189 - Philip D. MacKenzie, Alina Oprea, Michael K. Reiter:
Automatic generation of two-party computations. CCS 2003: 210-219 - William G. Morein, Angelos Stavrou
, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
Using graphic turing tests to counter automated DDoS attacks against web servers. CCS 2003: 8-19 - Makoto Murata
, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada:
XML access control using static analysis. CCS 2003: 73-84 - Peng Ning, Dingbang Xu:
Learning attack strategies from intrusion alerts. CCS 2003: 200-209 - Robin Sommer, Vern Paxson:
Enhancing byte-level network intrusion detection signatures with context. CCS 2003: 262-271 - Xinyuan Wang, Douglas S. Reeves:
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. CCS 2003: 20-29
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-08-14 23:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint