在好例子网,分享、交流、成长!
您当前所在位置:首页Others 开发实例一般编程问题 → CCS 2012-ACM Conference on Computer and Communications Security ...

CCS 2012-ACM Conference on Computer and Communications Security ...

一般编程问题

下载此实例
  • 开发语言:Others
  • 实例大小:63.84M
  • 下载次数:1
  • 浏览次数:81
  • 发布时间:2021-12-06
  • 实例类别:一般编程问题
  • 发 布 人:js2021
  • 文件格式:.zip
  • 所需积分:2
 

实例介绍

【实例简介】
(我现在主要在CSDN上整理计算机安全、软件工程(可信软件)、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://download.csdn.net/user/qysh123 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。请大家见谅。) 计算机及网络安全界的顶级会议,ACM Conference on Computer and Communications Security 2012年的会议论文集。欢迎大家下载、学习。2012年CCS共收录包括Keynote address在内的21个session共计82篇论文。
【实例截图】
【核心代码】
4744300845214289853.zip
└── CCS 2012
├── Advertising security & privacy
│   ├── Knowing your enemy_ understanding and detecting malicious web advertising.pdf
│   ├── Non-tracking web analytics.pdf
│   └── Privacy-aware personalization for mobile advertising.pdf
├── Anonymity & censorship
│   ├── CensorSpoofer_ asymmetric communication using IP spoofing for censorship-resistant web browsing.pdf
│   ├── Enhancing Tor's performance using real-time traffic classification.pdf
│   ├── Routing around decoys.pdf
│   ├── SkypeMorph_ protocol obfuscation for Tor bridges.pdf
│   └── StegoTorus_ a camouflage proxy for the Tor anonymity system.pdf
├── Applied cryptography I
│   ├── Full proof cryptography_ verifiable compilation of efficient zero-knowledge protocols.pdf
│   ├── Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes.pdf
│   ├── Practical yet universally composable two-server password-authenticated secret sharing.pdf
│   ├── Publicly verifiable delegation of large polynomials and matrix computations, with applications.pdf
│   └── Secure two-party computation in sublinear (amortized) time.pdf
├── Applied cryptography II
│   ├── Dynamic searchable symmetric encryption.pdf
│   ├── PrivateFS_ a parallel oblivious file system.pdf
│   └── Verifiable data streaming.pdf
├── Badware
│   ├── Before we knew it_ an empirical study of zero-day attacks in the real world.pdf
│   ├── Manufacturing compromise_ the emergence of exploit-as-a-service.pdf
│   ├── Priceless_ the role of payments in abuse-advertised goods.pdf
│   └── Vanity, cracks and malware_ insights into the anti-copy protection ecosystem.pdf
├── Cloud security
│   ├── Cross-VM side channels and their use to extract private keys.pdf
│   ├── Hourglass schemes_ how to prove that cloud files are encrypted.pdf
│   ├── Resource-freeing attacks_ improve your cloud performance (at your neighbor's expense).pdf
│   ├── Self-service cloud computing.pdf
│   └── Single round access privacy on outsourced storage.pdf
├── Infrastructure security & privacy
│   ├── GPS software attacks.pdf
│   ├── How secure are power network signature based time stamps.pdf
│   ├── Minimizing private data disclosures in the smart grid.pdf
│   ├── Neighborhood watch_ security and privacy analysis of automatic meter reading systems.pdf
│   └── SABOT_ specification-based payload generation for programmable logic controllers.pdf
├── Intrusions & abuse
│   ├── Blacksheep_ detecting compromised hosts in homogeneous crowds.pdf
│   ├── Innocent by association_ early recognition of legitimate users.pdf
│   ├── Kargus_ a highly-scalable software-based intrusion detection system.pdf
│   └── Populated IP addresses_ classification and applications.pdf
├── Keynote address
│   └── On the foundations of trust in networks of humans and computers.pdf
├── Mobile security
│   ├── CHEX_ statically vetting Android apps for component hijacking vulnerabilities.pdf
│   ├── Mobile data charging_ new attacks and countermeasures.pdf
│   ├── New privacy issues in mobile telephony_ fix and verification.pdf
│   ├── PScout_ analyzing the Android permission specification.pdf
│   └── Using probabilistic generative models for ranking risks of Android apps.pdf
├── Network Security
│   ├── Collaborative TCP sequence number inference attack_ how to crack sequence number under a second.pdf
│   ├── DCast_ sustaining collaboration in overlay multicast despite rational collusion.pdf
│   ├── PeerPress_ utilizing enemies' P2P strength against them.pdf
│   ├── Provable security of S-BGP and other path vector protocols_ model, analysis and extensions.pdf
│   └── Towards a bayesian network game framework for evaluating DDoS attacks and defense.pdf
├── Payments, votes & reputation
│   ├── Double-spending fast payments in bitcoin.pdf
│   ├── Measuring vote privacy, revisited.pdf
│   ├── PERM_ practical reputation-based blacklisting without TTPS.pdf
│   └── Revoke and let live_ a secure key revocation api for cryptographic devices.pdf
├── Privacy
│   ├── Deanonymizing mobility traces_ using social network as a side-channel.pdf
│   ├── Differentially private sequential data publication via variable-length n-grams.pdf
│   ├── On significance of the least significant bits for differential privacy.pdf
│   ├── Protecting location privacy_ optimal strategy against localization attacks.pdf
│   └── Touching from a distance_ website fingerprinting attacks and defenses.pdf
├── Secure computation
│   ├── Foundations of garbled circuits.pdf
│   ├── Salus_ a system for server-aided secure function evaluation.pdf
│   └── Secure two-party computations in ANSI C.pdf
├── Software security
│   ├── Adaptive defenses for commodity software through virtual application partitioning.pdf
│   ├── Aligot_ cryptographic function identification in obfuscated binary programs.pdf
│   ├── An historical examination of open source releases and their vulnerabilities.pdf
│   ├── Binary stirring_ self-randomizing instruction addresses of legacy x86 binary code.pdf
│   └── Leveraging choice to automate authorization hook placement.pdf
├── Systems security
│   ├── A software-hardware architecture for self-protecting data.pdf
│   ├── Fides_ selectively hardening software application components against kernel-level or process-level malware.pdf
│   └── Vigilare_ toward snoop-based kernel integrity monitor.pdf
├── Theory
│   ├── Intransitive noninterference in nondeterministic systems.pdf
│   ├── On the parameterized complexity of the workflow satisfiability problem.pdf
│   ├── Precise enforcement of progress-sensitive security.pdf
│   └── TreeDroid_ a tree automaton based approach to enforcing data processing policies.pdf
├── Transport layer security
│   ├── A cross-protocol attack on the TLS protocol.pdf
│   ├── The most dangerous code in the world_ validating SSL certificates in non-browser software.pdf
│   └── Why eve and mallory love android_ an analysis of android SSL (in)security.pdf
├── Usability, authentication & trust
│   ├── Operating system framed in case of mistaken identity .pdf
│   ├── OTO_ online trust oracle for user-centric trust establishment.pdf
│   ├── Strengthening user authentication through opportunistic cryptographic identity assertions.pdf
│   └── The devil is in the (implementation) details_ an empirical analysis of OAuth SSO systems.pdf
├── Verification
│   ├── Computational soundness without protocol restrictions.pdf
│   ├── Computational verification of C protocol implementations by symbolic execution.pdf
│   └── Verified security of redundancy-free encryption from Rabin and RSA.pdf
└── Web security
├── FlowFox_ a web browser with flexible and precise information flow control.pdf
├── Scriptless attacks_ stealing the pie without touching the sill.pdf
└── You are what you include_ large-scale evaluation of remote javascript inclusions.pdf

22 directories, 82 files

标签:

实例下载地址

CCS 2012-ACM Conference on Computer and Communications Security ...

不能下载?内容有错? 点击这里报错 + 投诉 + 提问

好例子网口号:伸出你的我的手 — 分享

网友评论

发表评论

(您的评论需要经过审核才能显示)

查看所有0条评论>>

小贴士

感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。

  • 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  • 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
  • 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  • 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。

关于好例子网

本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明

;
报警