ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2012 IEEE Symposium on Security and Privacy
Latest Publications
TOTAL DOCUMENTS
52
(FIVE YEARS 0)
H-INDEX
30
(FIVE YEARS 0)
Published By IEEE
9781467312448, 9780769546810
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Message from the Program Chairs: S&P 2012
2012 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2012.6
◽
2012
◽
Author(s):
Somesh Jha
◽
Wenke Lee
Download Full-text
Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution
2012 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2012.43
◽
2012
◽
Cited By ~ 36
Author(s):
Yan Huang
◽
Jonathan Katz
◽
David Evans
Download Full-text
IEEE Computer Society Technical & Conference Activities Board [Publisher's information]
2012 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2012.51
◽
2012
◽
Keyword(s):
Ieee Computer Society
Download Full-text
Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints
2012 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2012.12
◽
2012
◽
Cited By ~ 46
Author(s):
Yinglei Wang
◽
Wing-kei Yu
◽
Shuo Wu
◽
Greg Malysa
◽
G. Edward Suh
◽
...
Keyword(s):
Flash Memory
◽
Random Number
◽
Hardware Security
◽
Random Number Generation
◽
Number Generation
Download Full-text
Formalizing and Enforcing Purpose Restrictions in Privacy Policies
2012 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2012.21
◽
2012
◽
Cited By ~ 26
Author(s):
Michael Carl Tschantz
◽
Anupam Datta
◽
Jeannette M. Wing
Keyword(s):
Privacy Policies
Download Full-text
Abusing File Processing in Malware Detectors for Fun and Profit
2012 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2012.15
◽
2012
◽
Cited By ~ 34
Author(s):
Suman Jana
◽
Vitaly Shmatikov
Keyword(s):
File Processing
Download Full-text
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
2012 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2012.44
◽
2012
◽
Cited By ~ 281
Author(s):
Joseph Bonneau
◽
Cormac Herley
◽
Paul C. van Oorschot
◽
Frank Stajano
Keyword(s):
Comparative Evaluation
◽
Authentication Schemes
Download Full-text
Memento: Learning Secrets from Process Footprints
2012 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2012.19
◽
2012
◽
Cited By ~ 61
Author(s):
Suman Jana
◽
Vitaly Shmatikov
Download Full-text
Distance Hijacking Attacks on Distance Bounding Protocols
2012 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2012.17
◽
2012
◽
Cited By ~ 70
Author(s):
Cas Cremers
◽
Kasper B. Rasmussen
◽
Benedikt Schmidt
◽
Srdjan Capkun
Download Full-text
LASTor: A Low-Latency AS-Aware Tor Client
2012 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2012.35
◽
2012
◽
Cited By ~ 30
Author(s):
Masoud Akhoondi
◽
Curtis Yu
◽
Harsha V. Madhyastha
Keyword(s):
Low Latency
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close