1![2015 IEEE Symposium on Security and Privacy Effective Real-time Android Application Auditing Mingyuan Xia McGill University 2015 IEEE Symposium on Security and Privacy Effective Real-time Android Application Auditing Mingyuan Xia McGill University](https://www.pdfsearch.io/img/f4717def5487312c26e2a59c8be640f1.jpg) | Add to Reading ListSource URL: mxia.meLanguage: English - Date: 2017-02-08 07:01:32
|
---|
2![Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p](https://www.pdfsearch.io/img/bffa50c3cabd137ab83ea2812143f40e.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:58:45
|
---|
3![DR. KRISTA E. WIEGAND Director, Global Security Program Howard H. Baker Jr. Center for Public Policy University of Tennessee, Knoxville 1640 Cumberland Ave. Knoxville, TN DR. KRISTA E. WIEGAND Director, Global Security Program Howard H. Baker Jr. Center for Public Policy University of Tennessee, Knoxville 1640 Cumberland Ave. Knoxville, TN](https://www.pdfsearch.io/img/39185b377e8ad54a95a49f96cb356986.jpg) | Add to Reading ListSource URL: www.kristawiegand.comLanguage: English - Date: 2018-09-10 12:37:41
|
---|
4![HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu](https://www.pdfsearch.io/img/142188b5fea0aed79edcc0c4b55cdc1f.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-12 23:38:22
|
---|
5![Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email: Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:](https://www.pdfsearch.io/img/76e3eb90ffe192d36ac5f67e87169330.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:56:44
|
---|
6![Optimizing S-box Implementations for Several Criteria using SAT Solvers Ko Stoffelen Radboud University, Digital Security, Nijmegen, The Netherlands Optimizing S-box Implementations for Several Criteria using SAT Solvers Ko Stoffelen Radboud University, Digital Security, Nijmegen, The Netherlands](https://www.pdfsearch.io/img/fece93a035981ed744a0dea256a1f02e.jpg) | Add to Reading ListSource URL: ko.stoffelen.nlLanguage: English - Date: 2018-02-09 07:40:06
|
---|
7![SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m](https://www.pdfsearch.io/img/1b7cc22dce9e7d76123f9345e5a5d9f2.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2006-03-21 11:51:07
|
---|
8![Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa](https://www.pdfsearch.io/img/8c9fe6b3d23e94dbfa3ec8f9c0ad282f.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-13 08:11:56
|
---|
9![Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1 Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1](https://www.pdfsearch.io/img/4174bea91854d93ee223da334b3e80a9.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2009-09-22 19:00:54
|
---|
10![Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China](https://www.pdfsearch.io/img/b7c5ccefdc353b49b277c464ba9aebff.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-15 12:53:26
|
---|