Search Results - "Proceedings of the ... ACM Conference on Computer and Communications Security"

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Source: 6th Annual ACM Workshop on Artificial Intelligence and Security, AISec 2013, Co-located with the 20th ACM Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4 November 2013.

  5. 5

    Contributors: Wu, Mingli Yuen, Tsz Hon Yiu, Siu Ming et al.

    Source: Wu, M, Yuen, T H & Yiu, S M 2025, Efficient Private Set Intersection by Utilizing Oblivious Transfer Extension. in D Tien Tuan Anh & T Van Van (eds), Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery (ACM), New York NY USA, pp. 104-117, ACM ASIA Conference on Computer and Communications Security 2025, Hanoi, Vietnam, 25/08/25. https://doi.org/10.1145/3708821.3733886

    File Description: application/pdf

    Relation: urn:ISBN:9798400714108

  6. 6

    Source: Shamshad, S, Belguith, S & Oracevic, A 2025, A Quantum-Secure Framework for IoD : Strengthening Authentication and Key-Establishment. in ACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, pp. 313-326, 20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025, Hanoi, Viet Nam, 25/08/25. https://doi.org/10.1145/3708821.3736219

    Relation: urn:ISBN:9798400714108

  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Source: International Journal of Networked & Distributed Computing; Dec2025, Vol. 13 Issue 2, p1-21, 21p

  16. 16
  17. 17
  18. 18
  19. 19
  20. 20