On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Proceedings of the 12th ACM conference on Computer and communications security
Temporal search: detecting hidden malware timebombs with virtual machines
Proceedings of the 12th international conference on Architectural support for programming languages and operating systems
Tracking cyberstalkers: a cryptographic approach
ACM SIGCAS Computers and Society
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
An encrypted payload protocol and target-side scripting engine
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection
Transactions on Computational Science IV
On the implementation of security policies with adaptative encryption
Computer Communications
Assessment of advanced cryptographic antiviral techniques
International Journal of Electronic Security and Digital Forensics
IH'06 Proceedings of the 8th international conference on Information hiding
A subliminal-free variant of ECDSA
IH'06 Proceedings of the 8th international conference on Information hiding
A chameleon encryption scheme resistant to known-plaintext attack
Proceedings of the tenth annual ACM workshop on Digital rights management
Cloaking malware with the trusted platform module
SEC'11 Proceedings of the 20th USENIX conference on Security
Another look at “provable security”. II
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Secure mediation with mobile code
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Malicious cryptography: kleptographic aspects
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
A public key cryptosystem based on three new provable problems
Theoretical Computer Science
Impossibility proofs for RSA signatures in the standard model
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Partial key exposure on RSA with private exponents larger than N
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Hi-index | 0.00 |