11![Proceedings on Privacy Enhancing Technologies ; ):179–199 Steven Goldfeder*, Harry Kalodner, Dillon Reisman, and Arvind Narayanan When the cookie meets the blockchain: Privacy risks of web payments via cryptocu Proceedings on Privacy Enhancing Technologies ; ):179–199 Steven Goldfeder*, Harry Kalodner, Dillon Reisman, and Arvind Narayanan When the cookie meets the blockchain: Privacy risks of web payments via cryptocu](https://www.pdfsearch.io/img/6b7ecb156c79a2e2335ec614348b68bc.jpg) | Add to Reading ListSource URL: www.petsymposium.orgLanguage: English - Date: 2018-08-06 10:58:07
|
---|
12![USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su University of Adelaide Damith Ranasinghe University of Adelaide USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su University of Adelaide Damith Ranasinghe University of Adelaide](https://www.pdfsearch.io/img/13a95ae3e316523353df4e7ca500c42d.jpg) | Add to Reading ListSource URL: web.eecs.umich.eduLanguage: English - Date: 2017-08-28 17:01:11
|
---|
13![Bringing the Web up to Speed with WebAssembly Andreas Haas Andreas Rossberg Derek L. Schuff∗ Ben L. Titzer ∗ Google GmbH, Germany / Google Inc, USA {ahaas,rossberg,dschuff,titzer}@google.com Bringing the Web up to Speed with WebAssembly Andreas Haas Andreas Rossberg Derek L. Schuff∗ Ben L. Titzer ∗ Google GmbH, Germany / Google Inc, USA {ahaas,rossberg,dschuff,titzer}@google.com](https://www.pdfsearch.io/img/9d8ed8e774e485cd13d9b6e2d02354c9.jpg) | Add to Reading ListSource URL: www.cs.tufts.eduLanguage: English - Date: 2017-10-24 10:03:16
|
---|
14![The Anatomy of Web Censorship in Pakistan Zubair Nabi Information Technology University, Pakistan Abstract The Anatomy of Web Censorship in Pakistan Zubair Nabi Information Technology University, Pakistan Abstract](https://www.pdfsearch.io/img/ff77743dfc9ae247ec819abc5e8cd23f.jpg) | Add to Reading ListSource URL: www.usenix.orgLanguage: English - Date: 2013-10-25 08:52:50
|
---|
15![citation gecko LITERATURE DISCOVERY MADE EASY Citation Gecko is a new, open-source web app that gives researchers a birds-eye view of relevant literature. Using openly-available citation data, it constructs and visualise citation gecko LITERATURE DISCOVERY MADE EASY Citation Gecko is a new, open-source web app that gives researchers a birds-eye view of relevant literature. Using openly-available citation data, it constructs and visualise](https://www.pdfsearch.io/img/02d94f2b88df205057b6f601a05926cb.jpg) | Add to Reading ListSource URL: workshop-oc.github.ioLanguage: English - Date: 2018-09-10 10:16:09
|
---|
16![Order Fulfillment in Online Retailing: What Goes Where by Ping Josephine Xu M.S. Operations Research Order Fulfillment in Online Retailing: What Goes Where by Ping Josephine Xu M.S. Operations Research](https://www.pdfsearch.io/img/244a3306b0e06a0f5e78ed37e4b63bfa.jpg) | Add to Reading ListSource URL: web.mit.eduLanguage: English - Date: 2018-07-20 12:49:48
|
---|
17![This paper appears at the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDIDetecting and Defending Against Third-Party Tracking on the Web Franziska Roesner, Tadayoshi Kohno, and David We This paper appears at the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDIDetecting and Defending Against Third-Party Tracking on the Web Franziska Roesner, Tadayoshi Kohno, and David We](https://www.pdfsearch.io/img/1c348bb7f6e855d467d5f73aae38d488.jpg) | Add to Reading ListSource URL: www.doc.ic.ac.ukLanguage: English - Date: 2016-03-07 03:28:10
|
---|
18![Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/ Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/](https://www.pdfsearch.io/img/21e26c043846a39fbd81de7e25cc60e9.jpg) | Add to Reading ListSource URL: snap.stanford.eduLanguage: English - Date: 2017-04-03 00:44:26
|
---|
19![Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin Yuval Ishai Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin Yuval Ishai](https://www.pdfsearch.io/img/1b8ad37ef0de4f34dd89c348bfc64de0.jpg) | Add to Reading ListSource URL: web.eecs.umich.eduLanguage: English - Date: 2014-03-20 23:52:12
|
---|
20![Velocity-based Storage and Stowage Decisions in a Semiautomated Fulfillment System by Rong Yuan Submitted to the Sloan School of Management on July 19, 2016 in partial fulfillment of the requirements for the degree of Do Velocity-based Storage and Stowage Decisions in a Semiautomated Fulfillment System by Rong Yuan Submitted to the Sloan School of Management on July 19, 2016 in partial fulfillment of the requirements for the degree of Do](https://www.pdfsearch.io/img/ef027caf6cfac8f3a8caf9e776f2b102.jpg) | Add to Reading ListSource URL: web.mit.eduLanguage: English - Date: 2017-03-02 13:15:10
|
---|