Výsledky vyhledávání - Proceedings of the ... ACM Conference on Computer and Communications Security
-
1
Autoři:
Přispěvatelé:
Zdroj: Bibliogr. przy rozdz. Indeks.
Témata: Cyberbezpieczeństwo -- konferencje, Systemy telekomunikacyjne -- środki bezpieczeństwa -- konferencje
Přístupová URL adresa: http://katalog.nukat.edu.pl/lib/item?id=chamo:1540416&theme=nukat
-
2
Autoři:
Zdroj: Computational soundness without protocol restrictions..
-
3
Autoři:
Zdroj: Computationally sound verification of source code.
-
4
Autoři: a další
Přispěvatelé: a další
Zdroj: Klemmer, J H, Horstmann, S A, Patnaik, N, Ludden, C, Jr., C B, Powers, C, Massacci, F, Rahman, A, Votipka, D, Lipford, H R, Rashid, A, Naiakshina, A & Fahl, S 2024, Using AI Assistants in Software Development : A Qualitative Study on Security Practices and Concerns. in B Luo, X Liao, J Xu, E Kirda & D Lie (eds), CCS '24 : Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, ACM SIGGRAPH, pp. 2726-2740, CCS '24: ACM SIGSAC Conference on Computer and Communications Security, Salt Lake City, Utah, United States, 14/10/24. https://doi.org/10.1145/3658644.3690283
Témata: LLM, Software Security, FOS: Computer and information sciences, Computer Science - Cryptography and Security, AI Assistants, Generative AI, Interviews, Large Language Models, Software Development, 16. Peace & justice, Software Engineering (cs.SE), Computer Science - Software Engineering, Cryptography and Security (cs.CR)
Popis souboru: application/pdf
-
5
Autoři: a další
Zdroj: Journal on Internet of Things; 2025, Vol. 7 Issue 1, p19-48, 30p
-
6
Autoři: a další
Zdroj: Proceedings of the ACM Conference on Computer and Communications Security. 2014-November(November)
Přístupová URL adresa: https://research.chalmers.se/publication/236427
-
7
Autoři: a další
Zdroj: 6th Annual ACM Workshop on Artificial Intelligence and Security, AISec 2013, Co-located with the 20th ACM Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4 November 2013.
Přístupová URL adresa: https://research.chalmers.se/publication/189923
-
8
Autoři: a další
Zdroj: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. :630-644
Témata: FOS: Computer and information sciences, Sound (cs.SD), Computer Science - Cryptography and Security, Audio and Speech Processing (eess.AS), FOS: Electrical engineering, electronic engineering, information engineering, Cryptography and Security (cs.CR), Computer Science - Sound, Electrical Engineering and Systems Science - Audio and Speech Processing
Přístupová URL adresa: http://arxiv.org/abs/2406.19311
-
9
Autoři: a další
Zdroj: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. :423-436
Témata: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, Cryptography and Security (cs.CR)
Přístupová URL adresa: http://arxiv.org/abs/2409.04341
-
10
Autoři:
Zdroj: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. :1997-2011
Témata: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Přístupová URL adresa: http://arxiv.org/abs/2407.00918
-
11
Autoři: a další
Zdroj: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. :660-674
Témata: FOS: Computer and information sciences, Artificial Intelligence (cs.AI), Cryptography and Security, Artificial Intelligence, Cryptography and Security (cs.CR)
Přístupová URL adresa: http://arxiv.org/abs/2403.17710
-
12
Autoři: a další
Zdroj: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. :3600-3614
Témata: Machine Learning, FOS: Computer and information sciences, Artificial Intelligence (cs.AI), Cryptography and Security, Artificial Intelligence, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Přístupová URL adresa: http://arxiv.org/abs/2405.06823
-
13
Autoři:
Zdroj: Shamshad, S, Belguith, S & Oracevic, A 2025, A Quantum-Secure Framework for IoD : Strengthening Authentication and Key-Establishment. in ACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, pp. 313-326, 20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025, Hanoi, Viet Nam, 25/08/25. https://doi.org/10.1145/3708821.3736219
Témata: Authentication, CRYSTAL-Kyber, Key Establishment, Mutual Authentication, Post-Quantum Cryptography
Relation: urn:ISBN:9798400714108
-
14
Autoři: a další
Zdroj: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
Témata: FOS: Computer and information sciences, data-flow linearization, Computer Science - Cryptography and Security, Computer Science - Programming Languages, compilers, constant-time programming, side channels, 02 engineering and technology, D.4.6, 0202 electrical engineering, electronic engineering, information engineering, control-flow linearization, Cryptography and Security (cs.CR), Programming Languages (cs.PL)
Popis souboru: application/pdf
-
15
Autoři:
Zdroj: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. :4988-4990
Témata: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Přístupová URL adresa: http://arxiv.org/abs/2408.16945
-
16
Autoři: a další
Přispěvatelé: a další
Zdroj: Wu, M, Yuen, T H & Yiu, S M 2025, Efficient Private Set Intersection by Utilizing Oblivious Transfer Extension. in D Tien Tuan Anh & T Van Van (eds), Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery (ACM), New York NY USA, pp. 104-117, ACM ASIA Conference on Computer and Communications Security 2025, Hanoi, Vietnam, 25/08/25. https://doi.org/10.1145/3708821.3733886
Témata: Oblivious key-value store, Oblivious pseudorandom function, Oblivious transfer extension, Private set intersection
Popis souboru: application/pdf
Relation: urn:ISBN:9798400714108
-
17
Autoři: a další
Zdroj: David, B, Magri, B, Matt, C, Nielsen, J B & Tschudi, D 2022, GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy. in CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3548606.3559375
David, B, Magri, B, Matt, C, Nielsen, J B & Tschudi, D 2022, GearBox : Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy. in CCS 2022-Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, pp. 683-696, 28th ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, United States, 7/11/22. https://doi.org/10.1145/3548606.3559375
David, B, Magri, B, Matt, C, Nielsen, J B & Tschudi, D 2022, GearBox : Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy. in CCS'22-Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, pp. 683-696, 28th ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, United States, 07/11/2022. https://doi.org/10.1145/3548606.3559375Témata: blockchain, sharding, 0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences
Popis souboru: application/pdf
Přístupová URL adresa: https://research.manchester.ac.uk/en/publications/f749a8b5-8786-48fe-91fe-12045e03cde5
https://doi.org/10.1145/3548606.3559375
https://pure.itu.dk/ws/files/93430639/2021_211.pdf
https://research.manchester.ac.uk/en/publications/f749a8b5-8786-48fe-91fe-12045e03cde5
https://doi.org/10.1145/3548606.3559375
http://www.scopus.com/inward/record.url?scp=85143071379&partnerID=8YFLogxK
https://pure.au.dk/portal/en/publications/92e6de2d-cac1-4225-9f26-3550332c05ad
https://doi.org/10.1145/3548606.3559375
http://www.scopus.com/inward/record.url?scp=85143071379&partnerID=8YFLogxK -
18
Autoři:
Zdroj: Cuestiones de Fisioterapia; 2025, Vol. 54 Issue 2, p3459-3489, 31p
-
19
Autoři: Hansen, Kristian Bondo
Zdroj: Science, Technology & Human Values; Sep2025, Vol. 50 Issue 5, p932-961, 30p
-
20
Autoři:
Resource Type: eBook.
Categories: COMPUTERS / Software Development & Engineering / General, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Computer Science
Plný text ve formátu PDF Plný text ve formátu ePub
Nájsť tento článok vo Web of Science
Full Text Finder