Personensuche
X
?
Proceedings of the 35th Annual ACM Symposium on Applied Computing ,
1
HeadPrint : detecting anomalous communications through h..:
, In:
?
Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology ,
2
Practical Mutation Testing for Smart Contracts:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
3
Multi-client Predicate-Only Encryption for Conjunctive Equa..:
, In:
?
Proceedings of the 33rd Annual Computer Security Applications Conference ,
4
DECANTeR : DEteCtion of Anomalous outbouNd HTTP TRaffic ..:
, In:
?
Proceedings of the 32nd Annual Conference on Computer Security Applications ,
5
Reliably determining data leakage in the presence of strong..:
, In:
?
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society ,
6
Vote to Link : Recovering from Misbehaving Anonymous Use..:
, In:
?
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security ,
7