Usable PIR
2024-1-4 20:1:7 Author: www.ndss-symposium.org(查看原文) 阅读量:2 收藏

A New Privacy-Enhanced Matchmaking Protocol

J. Shin and V. Gligor

Read More

Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority

D. Dagon , C. P. Lee and Wenke Lee

Read More

A Tune-up for Tor: Improving Security and Performance in the Tor Network

R. Snader and Nikita Borisov

Read More

Halo: High Assurance Locate for Distributed Hash Tables

Apu Kapadia and N. Triandopoulos

Read More

Robust Receipt-Free Election System with Ballot Secrecy and Verifiability

S. S. M. Chow, J. Liu and D. Wong

Read More

Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems

Patrick Traynor, K. Butler, W. Enck and P. McDaniel

Read More

Analyzing Privacy in Enterprise Packet Trace Anonymization

B. Ribeiro, W. Chen, G. Miklau and D. Towsley

Read More

Taming the Devil: Techniques for Evaluating Anonymized Network Data

Scott Coull, C. Wright, A. Keromytis, Fabian Monrose and Michael K. Reiter

Read More

Automated Whitebox Fuzz Testing

P. Godefroid, M. Levin and D. Molnar

Read More

Would Diversity Really Increase the Robustness of the Routing Infrastructure Against Software Defects?

Juan Caballero, T. Kampouris, Dawn Song and J. Wang

Read More

PRECIP: Towards Practical and Retrofittable Confidential Information Protection

Xiaofeng Wang, Z. Li, Ninghui Li and J. Y. Choi

Read More

Automatic Network Protocol Analysis

G. Wondracek, P. Milani Comparetti, Christopher Kruegel and Engin Kirda

Read More

Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution

Zhiqiang Lin, Xuxian Jiang, Dongyan Xu and Xiangyu Zhang

Read More

HookFinder: Identifying and Understanding Malware Hooking Behaviors

Heng Yin, Z. Liang and Dawn Song

Read More

Measuring and Detecting Fast-Flux Service Networks

Thorsten Holz, C. Gorecki, K. Rieck and F. Freiling

Read More

BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic

G. Gu, J. Zhang and Wenke Lee

Read More

Limits of Learning-based Signature Generation with Adversaries

S. Venkataraman, A. Blum and Dawn Song

Read More

Impeding Malware Analysis Using Conditional Code Obfuscation

M. Sharif, A. Lanzi, Jonathon Giffin and Wenke Lee

Read More

Analysis-Resistant Malware

J. Bethencourt, Dawn Song and Brent Waters

Read More

Exploiting Opportunistic Scheduling in Cellular Data Networks

R. Racic, D. Ma, H. Chen and X. Liu

Read More


文章来源: https://www.ndss-symposium.org/ndss2008/accepted-papers/#Usable%20PIR
如有侵权请联系:admin#unsafe.sh