×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [usenix security]
Reliably Erasing Data From Flash-Based Solid State Drives
206 views
Skype Morph
142 views
Trafficking fraudulent accounts : the role of the underground market in twitter spam and abuse - 2013 - Usenix
1.265 views
Network-Level Spam and Scam Defenses Nick Feamster Georgia Tech with Anirudh Ramachandran, Shuang Hao, Maria Konte Alex Gray, Sven Krasser, Santosh Vempala,
219 views
Quid-Pro-Quo-tocols Strengthening Semi-Honest Protocols with Dual Execution Yan Huang 1, Jonathan Katz 2, David Evans 1 1. University of Virginia 2. University
212 views
1 Practical Cryptographic Secure Computation David Evans University of Virginia DHOSA MURI
216 views
Automatic Inference and Enforcement of Kernel Data Structure Invariants Arati Baliga, Vinod Ganapathy and Liviu Iftode Department of Computer Science Rutgers
213 views
Leakage- Resilient Cryptography: Recent Advances Research Exam May 20, 2010 Petros Mol 1
213 views
VDG 12/5/2003 1 On the Prevention of Service Flooding in the Internet Virgil D. Gligor
[email protected]
Electrical and Computer Engineering Department University
217 views
Ethnographic Fieldwork at a University IT Security Office Xinming (Simon) Ou Kansas State University Joint work with John McHugh, S. Raj Rajagopalan, Sathya
213 views
The Yin-Yang of Web Authentication
834 views
Putting a Fork in Fork (Linux Process and Memory Management)
1.555 views
Next >