ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
Latest Publications
TOTAL DOCUMENTS
36
(FIVE YEARS 0)
H-INDEX
23
(FIVE YEARS 0)
Published By ACM Press
1581139616
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
IP covert timing channels
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
◽
10.1145/1030083.1030108
◽
2004
◽
Cited By ~ 164
Author(s):
Serdar Cabuk
◽
Carla E. Brodley
◽
Clay Shields
Keyword(s):
Timing Channels
◽
Covert Timing Channels
Download Full-text
Security policies for downgrading
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
◽
10.1145/1030083.1030110
◽
2004
◽
Cited By ~ 36
Author(s):
Stephen Chong
◽
Andrew C. Myers
Keyword(s):
Security Policies
Download Full-text
Payload attribution via hierarchical bloom filters
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
◽
10.1145/1030083.1030089
◽
2004
◽
Cited By ~ 39
Author(s):
Kulesh Shanmugasundaram
◽
Herv� Br�nnimann
◽
Nasir Memon
Keyword(s):
Bloom Filters
Download Full-text
k -anonymous secret handshakes with reusable credentials
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
◽
10.1145/1030083.1030105
◽
2004
◽
Cited By ~ 43
Author(s):
Shouhuai Xu
◽
Moti Yung
Download Full-text
Direct anonymous attestation
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
◽
10.1145/1030083.1030103
◽
2004
◽
Cited By ~ 377
Author(s):
Ernie Brickell
◽
Jan Camenisch
◽
Liqun Chen
Keyword(s):
Direct Anonymous Attestation
Download Full-text
A PIN-entry method resilient against shoulder surfing
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
◽
10.1145/1030083.1030116
◽
2004
◽
Cited By ~ 99
Author(s):
Volker Roth
◽
Kai Richter
◽
Rene Freidinger
Keyword(s):
Shoulder Surfing
Download Full-text
Using build-integrated static checking to preserve correctness invariants
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
◽
10.1145/1030083.1030122
◽
2004
◽
Cited By ~ 3
Author(s):
Hao Chen
◽
Jonathan S. Shapiro
Keyword(s):
Static Checking
Download Full-text
On achieving software diversity for improved network security using distributed coloring algorithms
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
◽
10.1145/1030083.1030101
◽
2004
◽
Cited By ~ 40
Author(s):
Adam J. O'Donnell
◽
Harish Sethu
Keyword(s):
Network Security
◽
Software Diversity
Download Full-text
A decision procedure for the verification of security protocols with explicit destructors
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
◽
10.1145/1030083.1030121
◽
2004
◽
Cited By ~ 15
Author(s):
St�phanie Delaune
◽
Florent Jacquemard
Keyword(s):
Decision Procedure
◽
Security Protocols
Download Full-text
Attacking and repairing the winZip encryption scheme
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
◽
10.1145/1030083.1030095
◽
2004
◽
Cited By ~ 17
Author(s):
Tadayoshi Kohno
Keyword(s):
Encryption Scheme
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close