default search action
ACM Transactions on Privacy and Security, Volume 25
Volume 25, Number 1, February 2022
- Savvas Savvides, Seema Kumar, Julian James Stephen, Patrick Eugster:
C3PO: Cloud-based Confidentiality-preserving Continuous Query Processing. 1:1-1:36 - Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise:
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud. 2:1-2:37 - Handan Kilinç Alper, Alptekin Küpçü:
Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation. 3:1-3:34 - Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch:
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study. 4:1-4:28 - Sibghat Ullah Bazai, Julian Jang-Jaccard, Hooman Alavizadeh:
A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark. 5:1-5:25 - Fabio Pagani, Davide Balzarotti:
AutoProfile: Towards Automated Profile Generation for Memory Analysis. 6:1-6:26 - Angelo Massimo Perillo, Giuseppe Persiano, Alberto Trombetta:
Secure Selections on Encrypted Multi-writer Streams. 7:1-7:33
Volume 25, Number 2, May 2022
- Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko:
MOTION - A Framework for Mixed-Protocol Multi-Party Computation. 8:1-8:35 - Marcus Botacin, Francis B. Moreira, Philippe O. A. Navaux, André Grégio, Marco A. Z. Alves:
Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints. 9:1-9:34 - Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martín Ochoa:
Constrained Proximity Attacks on Mobile Targets. 10:1-10:29 - Alexandre Debant, Stéphanie Delaune, Cyrille Wiedling:
So Near and Yet So Far - Symbolic Verification of Distance-Bounding Protocols. 11:1-11:39 - Yevhen Zolotavkin, Jongkil Jay Jeong, Veronika Kuchta, Maksym Slavnenko, Robin Doss:
Improving Unlinkability of Attribute-based Authentication through Game Theory. 12:1-12:36 - Nadia Daoudi, Kevin Allix, Tegawendé François D. Assise Bissyandé, Jacques Klein:
A Deep Dive Inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores. 13:1-13:28 - Pascal Oser, Rens W. van der Heijden, Stefan Lüders, Frank Kargl:
Risk Prediction of IoT Devices Based on Vulnerability Analysis. 14:1-14:36 - Julian de Gortari Briseno, Akash Deep Singh, Mani Srivastava:
InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks. 15:1-15:26
Volume 25, Number 3, August 2022
- Chris Clifton, Eric J. Hanson, Keith Merrill, Shawn Merrill:
Differentially Private k-Nearest Neighbor Missing Data Imputation. 16:1-16:23 - Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, Xiaofeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. 17:1-17:31 - Max Landauer, Florian Skopik, Markus Wurzenberger, Andreas Rauber:
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation. 18:1-18:36 - Cláudio Martins, Ibéria Medeiros:
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy. 19:1-19:39 - Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi:
Information Leakage Games: Exploring Information as a Utility Function. 20:1-20:36 - Andreas Fischer, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum, Eric Bodden:
Computation on Encrypted Data Using Dataflow Authentication. 21:1-21:36 - Padmavathi Iyer, Amirreza Masoumzadeh:
Learning Relationship-Based Access Control Policies from Black-Box Systems. 22:1-22:36 - Yaguan Qian, Yankai Guo, Qiqi Shao, Jiamin Wang, Bin Wang, Zhaoquan Gu, Xiang Ling, Chunming Wu:
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks. 23:1-23:24 - Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald:
Privacy-Preserving Decision Trees Training and Prediction. 24:1-24:30
Volume 25, Number 4, November 2022
- Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr:
Accountable Private Set Cardinality for Distributed Measurement. 25:1-25:35 - Sarah M. Lehman, Abrar S. Alrumayh, Kunal Kolhe, Haibin Ling, Chiu C. Tan:
Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications. 26:1-26:35 - Andrea Oliveri, Davide Balzarotti:
In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics. 27:1-27:32 - Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:
Valued Authorization Policy Existence Problem: Theory and Experiments. 28:1-28:32 - Lihi Idan, Joan Feigenbaum:
PRShare: A Framework for Privacy-preserving, Interorganizational Data Sharing. 29:1-29:38 - Milica Stojmenovic, Eric Spero, Milos Stojmenovic, Robert Biddle:
What is Beautiful is Secure. 30:1-30:30 - Eyal Nussbaum, Michael Segal:
Privacy Analysis of Query-Set-Size Control. 31:1-31:19 - Jinhua Cui, Shweta Shinde, Satyaki Sen, Prateek Saxena, Pinghai Yuan:
Dynamic Binary Translation for SGX Enclaves. 32:1-32:40 - William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. 33:1-33:35 - Alesia Chernikova, Alina Oprea:
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments. 34:1-34:34
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.