Search for persons
X
?
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies ,
2
Multi-party Access Control - 10 Years of Successes and Less..:
, In:
?
Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy ,
3
Backdoor Embedding in Convolutional Neural Network Models v..:
, In:
?
2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) ,
4
Location Privacy Protection in Vehicle-Based Spatial Crowds..:
, In:
?
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy ,
7
Session details: Mobile Security:
, In:
?
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies ,
8
Multi-Party Access Control : Requirements, State of the ..:
, In:
?
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) ,
10
Dynamic Contract Design for Heterogenous Workers in Crowdso..:
, In:
?
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy ,
12
Toward De-Anonymizing Bitcoin by Mapping Users Location:
, In:
?
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies ,
14
Privacy and Access Control : How are These Two concepts ..:
, In:
?
Proceedings of the 29th Annual ACM Symposium on Applied Computing ,
15