ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
Latest Publications
TOTAL DOCUMENTS
50
(FIVE YEARS 50)
H-INDEX
0
(FIVE YEARS 0)
Published By ACM
9781450381437
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Session details: Panels
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
◽
10.1145/3460473
◽
2021
◽
Author(s):
Sudip Mittal Maanak Gupta
Download Full-text
Session details: Session 6 Hardware and Device Security/Privacy
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
◽
10.1145/3460470
◽
2021
◽
Author(s):
Ziming Zhao
Download Full-text
Ghost Thread
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
◽
10.1145/3422337.3447846
◽
2021
◽
Author(s):
Robert Brotzman
◽
Danfeng Zhang
◽
Mahmut Kandemir
◽
Gang Tan
Download Full-text
Blockchain-based Proof of Existence (PoE) Framework using Ethereum Smart Contracts
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
◽
10.1145/3422337.3450319
◽
2021
◽
Author(s):
Lim Wei Ming Shawn
◽
Purnima Murali Mohan
◽
Peter Loh Kok Keong
◽
Vivek Balachandran
Keyword(s):
Smart Contracts
Download Full-text
The Cost of OSCORE and EDHOC for Constrained Devices
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
◽
10.1145/3422337.3447834
◽
2021
◽
Author(s):
Stefan Hristozov
◽
Manuel Huber
◽
Lei Xu
◽
Jaro Fietz
◽
Marco Liess
◽
...
Keyword(s):
The Cost
◽
Constrained Devices
Download Full-text
Don't fool yourself with Forward Privacy, Your queries STILL belong to us!
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
◽
10.1145/3422337.3447838
◽
2021
◽
Author(s):
Khosro Salmani
◽
Ken Barker
Download Full-text
Graph-Based Specification of Admin-CBAC Policies
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
◽
10.1145/3422337.3447850
◽
2021
◽
Author(s):
Clara Bertolissi
◽
Maribel Fernandez
◽
Bhavani Thuraisingham
Download Full-text
Security Threats from Bitcoin Wallet Smartphone Applications
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
◽
10.1145/3422337.3447832
◽
2021
◽
Author(s):
Yiwen Hu
◽
Sihan Wang
◽
Guan-Hua Tu
◽
Li Xiao
◽
Tian Xie
◽
...
Keyword(s):
Security Threats
◽
Smartphone Applications
Download Full-text
Role-Based Deception in Enterprise Networks
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
◽
10.1145/3422337.3447824
◽
2021
◽
Author(s):
Iffat Anjum
◽
Mu Zhu
◽
Isaac Polinsky
◽
William Enck
◽
Michael K. Reiter
◽
...
Keyword(s):
Enterprise Networks
◽
Role Based
Download Full-text
Incremental Maintenance of ABAC Policies
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
◽
10.1145/3422337.3447825
◽
2021
◽
Author(s):
Gunjan Batra
◽
Vijayalakshmi Atluri
◽
Jaideep Vaidya
◽
Shamik Sural
Keyword(s):
Incremental Maintenance
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close