


default search action
ACM Transactions on Privacy and Security, Volume 20
Volume 20, Number 1, February 2017
- Stephanos Matsumoto

, Raphael M. Reischuk, Pawel Szalachowski, Tiffany Hyun-Jin Kim, Adrian Perrig:
Authentication Challenges in a Global Environment. 1:1-1:34 - Isabel Wagner

:
Evaluating the Strength of Genomic Privacy Metrics. 2:1-2:34 - Mathias Humbert, Erman Ayday, Jean-Pierre Hubaux, Amalio Telenti:

Quantifying Interdependent Risks in Genomic Privacy. 3:1-3:31
Volume 20, Number 2, May 2017
- Alessandro Checco

, Giuseppe Bianchi, Douglas J. Leith
:
BLC: Private Matrix Factorization Recommenders via Automatic Group Learning. 4:1-4:25 - Leon J. Osterweil, Matt Bishop

, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva
, George S. Avrunin, Lori A. Clarke, Sean Peisert
:
Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example. 5:1-5:31 - Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:

Pulse-Response: Exploring Human Body Impedance for Biometric Recognition. 6:1-6:31
Volume 20, Number 3, August 2017
- Job Noorman, Jo Van Bulck

, Jan Tobias Mühlberg
, Frank Piessens, Pieter Maene
, Bart Preneel
, Ingrid Verbauwhede
, Johannes Götzfried, Tilo Müller, Felix C. Freiling:
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. 7:1-7:33 - Marcus Brandenburger, Christian Cachin, Nikola Knezevic:

Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores. 8:1-8:30 - Ehsan Toreini, Siamak F. Shahandashti

, Feng Hao
:
Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns. 9:1-9:29 - Luis Muñoz-González

, Daniele Sgandurra, Andrea Paudice
, Emil C. Lupu:
Efficient Attack Graph Analysis through Approximate Inference. 10:1-10:30 - Bradley Reaves, Jasmine D. Bowers, Nolen Scaife

, Adam Bates, Arnav Bhartiya, Patrick Traynor, Kevin R. B. Butler
:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications. 11:1-11:31
Volume 20, Number 4, October 2017
- Xiaokui Shu

, Danfeng (Daphne) Yao
, Naren Ramakrishnan
, Trent Jaeger:
Long-Span Program Behavior Modeling and Attack Detection. 12:1-12:28 - Muhammad Ikram

, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar
, M. Zubair Shafiq:
Measuring, Characterizing, and Detecting Facebook Like Farms. 13:1-13:28 - Yuriy Polyakov

, Kurt Rohloff
, Gyana Sahu, Vinod Vaikuntanathan:
Fast Proxy Re-Encryption for Publish/Subscribe Systems. 14:1-14:31 - Antonino Rullo

, Daniele Midi, Edoardo Serra
, Elisa Bertino:
Pareto Optimal Security Resource Allocation for Internet of Things. 15:1-15:30 - Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Min Lyu, Hongxia Jin:

Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization. 16:1-16:33

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














