×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [acm ccs]
March12 alzantot
23 views
Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See
221 views
GPN 2009 May 29, Kansas City, Missouri An open security defense architecture for open collaborative cyber infrastructures Xinming (Simon) Ou Kansas State
217 views
1 Representing a Computer Science Research Organization on the ACM Computing Classification System Boris Mirkin School of Computer Science and Information
214 views
Antonella De Robbio, Dario Maguolo Mathematics Library – University Library System University of Padova – ITALY Mathematics Subject Classification and
217 views
Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing
216 views
Dissecting One Click Frauds Authors: Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki Proceedings of the ACM CCS 2010 Reporter: Jing Chiu Advisor:
219 views
SOMA: Mutual Approval for Included Content in Web Pages Terri Oda, Glenn Wurster, P.C. van Oorschot, Anil Somayaji Carleton Computer Security Lab Carleton
218 views
Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur 721302 Stability analysis of peer to peer
236 views
MURI Kickoff Welcome! First, introductions… all around Some context and expectations u We’re going to give some informal presentations about our plans
224 views
Roberto Paleari,Universit`a degli Studi di Milano Lorenzo Martignoni,Universit`a degli Studi di Udine Emanuele Passerini,Universit`a degli Studi di Milano
220 views
Analyzing the Vulnerability of Superpeer Networks Against Churn and Attack
24 views
< Prev
Next >