ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12
Latest Publications
TOTAL DOCUMENTS
16
(FIVE YEARS 0)
H-INDEX
7
(FIVE YEARS 0)
Published By ACM Press
9781450316651
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Unity
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12
◽
10.1145/2381913.2381920
◽
2012
◽
Cited By ~ 4
Author(s):
Beom Heyn Kim
◽
Wei Huang
◽
David Lie
Download Full-text
Towards an interpreter for efficient encrypted computation
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12
◽
10.1145/2381913.2381928
◽
2012
◽
Cited By ~ 6
Author(s):
Christopher W. Fletcher
◽
Marten van Dijk
◽
Srinivas Devadas
Download Full-text
Are AES x86 cache timing attacks still feasible?
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12
◽
10.1145/2381913.2381917
◽
2012
◽
Cited By ~ 21
Author(s):
Keaton Mowery
◽
Sriram Keelveedhi
◽
Hovav Shacham
Keyword(s):
Timing Attacks
Download Full-text
Efficient query integrity for outsourced dynamic databases
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12
◽
10.1145/2381913.2381927
◽
2012
◽
Cited By ~ 15
Author(s):
Qingji Zheng
◽
Shouhuai Xu
◽
Giuseppe Ateniese
Keyword(s):
Dynamic Databases
◽
Query Integrity
Download Full-text
Exploiting split browsers for efficiently protecting user data
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12
◽
10.1145/2381913.2381921
◽
2012
◽
Cited By ~ 2
Author(s):
Angeliki Zavou
◽
Elias Athanasopoulos
◽
Georgios Portokalidis
◽
Angelos D. Keromytis
Keyword(s):
User Data
Download Full-text
Revisiting DNS and WHOIS in the cloud era
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12
◽
10.1145/2381913.2381929
◽
2012
◽
Author(s):
Burton Stephen Kaliski
Download Full-text
What if we got a do-over?
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12
◽
10.1145/2381913.2381923
◽
2012
◽
Cited By ~ 2
Author(s):
Howard E. Shrobe
Download Full-text
LoSt
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12
◽
10.1145/2381913.2381926
◽
2012
◽
Cited By ~ 25
Author(s):
Gaven J. Watson
◽
Reihaneh Safavi-Naini
◽
Mohsen Alimomeni
◽
Michael E. Locasto
◽
Shivaramakrishnan Narayan
Download Full-text
Practical applications of homomorphic encryption
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12
◽
10.1145/2381913.2381924
◽
2012
◽
Cited By ~ 6
Author(s):
Kristin E. Lauter
Keyword(s):
Homomorphic Encryption
◽
Practical Applications
Download Full-text
Managing trust and secrecy in identity management clouds
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12
◽
10.1145/2381913.2381933
◽
2012
◽
Author(s):
Apurva Kumar
Keyword(s):
Identity Management
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close