ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
Latest Publications
TOTAL DOCUMENTS
58
(FIVE YEARS 0)
H-INDEX
33
(FIVE YEARS 0)
Published By ACM Press
9781605588940
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Ripley
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
◽
10.1145/1653662.1653685
◽
2009
◽
Cited By ~ 33
Author(s):
K. Vikram
◽
Abhishek Prateek
◽
Benjamin Livshits
Download Full-text
Filter-resistant code injection on ARM
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
◽
10.1145/1653662.1653665
◽
2009
◽
Cited By ~ 7
Author(s):
Yves Younan
◽
Pieter Philippaerts
◽
Frank Piessens
◽
Wouter Joosen
◽
Sven Lachmund
◽
...
Keyword(s):
Code Injection
Download Full-text
SMILE
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
◽
10.1145/1653662.1653692
◽
2009
◽
Cited By ~ 77
Author(s):
Justin Manweiler
◽
Ryan Scudellari
◽
Landon P. Cox
Download Full-text
Fides
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
◽
10.1145/1653662.1653695
◽
2009
◽
Cited By ~ 5
Author(s):
Edward Kaiser
◽
Wu-chang Feng
◽
Travis Schluessler
Download Full-text
Certificateless onion routing
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
◽
10.1145/1653662.1653682
◽
2009
◽
Cited By ~ 14
Author(s):
Dario Catalano
◽
Dario Fiore
◽
Rosario Gennaro
Keyword(s):
Onion Routing
Download Full-text
Computational soundness for key exchange protocols with symmetric encryption
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
◽
10.1145/1653662.1653674
◽
2009
◽
Cited By ~ 11
Author(s):
Ralf Küsters
◽
Max Tuengerthal
Keyword(s):
Key Exchange
◽
Symmetric Encryption
◽
Key Exchange Protocols
Download Full-text
The fable of the bees
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
◽
10.1145/1653662.1653698
◽
2009
◽
Cited By ~ 16
Author(s):
Steffen Reidt
◽
Mudhakar Srivatsa
◽
Shane Balfe
Download Full-text
Dynamic provable data possession
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
◽
10.1145/1653662.1653688
◽
2009
◽
Cited By ~ 386
Author(s):
Chris Erway
◽
Alptekin Küpçü
◽
Charalampos Papamanthou
◽
Roberto Tamassia
Keyword(s):
Provable Data Possession
Download Full-text
Dispatcher
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
◽
10.1145/1653662.1653737
◽
2009
◽
Cited By ~ 96
Author(s):
Juan Caballero
◽
Pongsin Poosankam
◽
Christian Kreibich
◽
Dawn Song
Download Full-text
Countering kernel rootkits with lightweight hook protection
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
◽
10.1145/1653662.1653728
◽
2009
◽
Cited By ~ 107
Author(s):
Zhi Wang
◽
Xuxian Jiang
◽
Weidong Cui
◽
Peng Ning
Keyword(s):
Kernel Rootkits
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close