Výsledky vyhledávání - Proceedings of the ... ACM Conference on Computer and Communications Security

Upřesnit hledání
  1. 1
  2. 2
  3. 3
  4. 4

    Zdroj: Klemmer, J H, Horstmann, S A, Patnaik, N, Ludden, C, Jr., C B, Powers, C, Massacci, F, Rahman, A, Votipka, D, Lipford, H R, Rashid, A, Naiakshina, A & Fahl, S 2024, Using AI Assistants in Software Development : A Qualitative Study on Security Practices and Concerns. in B Luo, X Liao, J Xu, E Kirda & D Lie (eds), CCS '24 : Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, ACM SIGGRAPH, pp. 2726-2740, CCS '24: ACM SIGSAC Conference on Computer and Communications Security, Salt Lake City, Utah, United States, 14/10/24. https://doi.org/10.1145/3658644.3690283

    Popis souboru: application/pdf

  5. 5
  6. 6
  7. 7

    Zdroj: 6th Annual ACM Workshop on Artificial Intelligence and Security, AISec 2013, Co-located with the 20th ACM Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4 November 2013.

  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Zdroj: Shamshad, S, Belguith, S & Oracevic, A 2025, A Quantum-Secure Framework for IoD : Strengthening Authentication and Key-Establishment. in ACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, pp. 313-326, 20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025, Hanoi, Viet Nam, 25/08/25. https://doi.org/10.1145/3708821.3736219

    Relation: urn:ISBN:9798400714108

  14. 14
  15. 15
  16. 16

    Přispěvatelé: Wu, Mingli Yuen, Tsz Hon Yiu, Siu Ming a další

    Zdroj: Wu, M, Yuen, T H & Yiu, S M 2025, Efficient Private Set Intersection by Utilizing Oblivious Transfer Extension. in D Tien Tuan Anh & T Van Van (eds), Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery (ACM), New York NY USA, pp. 104-117, ACM ASIA Conference on Computer and Communications Security 2025, Hanoi, Vietnam, 25/08/25. https://doi.org/10.1145/3708821.3733886

    Popis souboru: application/pdf

    Relation: urn:ISBN:9798400714108

  17. 17

    Zdroj: David, B, Magri, B, Matt, C, Nielsen, J B & Tschudi, D 2022, GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy. in CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3548606.3559375
    David, B, Magri, B, Matt, C, Nielsen, J B & Tschudi, D 2022, GearBox : Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy. in CCS 2022-Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, pp. 683-696, 28th ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, United States, 7/11/22. https://doi.org/10.1145/3548606.3559375
    David, B, Magri, B, Matt, C, Nielsen, J B & Tschudi, D 2022, GearBox : Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy. in CCS'22-Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, pp. 683-696, 28th ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, United States, 07/11/2022. https://doi.org/10.1145/3548606.3559375

    Popis souboru: application/pdf

  18. 18
  19. 19
  20. 20