default search action
ACM Transactions on Privacy and Security, Volume 23
Volume 23, Number 1, February 2020
- Thang Hoang, Attila A. Yavuz, Jorge Guajardo:
A Multi-server ORAM Framework with Constant Client Bandwidth Blowup. 1:1-1:35 - Hassan Khan, Urs Hengartner, Daniel Vogel:
Mimicry Attacks on Smartphone Keystroke Authentication. 2:1-2:34 - Ruggero Lanotte, Massimo Merro, Andrei Munteanu, Luca Viganò:
A Formal Approach to Physics-based Attacks in Cyber-physical Systems. 3:1-3:41 - Amith K. Belman, Vir V. Phoha:
Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification. 4:1-4:36 - Farzaneh Karegar, John Sören Pettersson, Simone Fischer-Hübner:
The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention. 5:1-5:38 - Fang-Jing Wu, Tie Luo:
CrowdPrivacy: Publish More Useful Data with Less Privacy Exposure in Crowdsourced Location-Based Services. 6:1-6:25
Volume 23, Number 2, May 2020
- Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Jungong Han, Zheng Wang:
Using Generative Adversarial Networks to Break and Protect Text Captchas. 7:1-7:29 - Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading. 8:1-8:27 - Moni Naor, Lior Rotem, Gil Segev:
The Security of Lazy Users in Out-of-Band Authentication. 9:1-9:32 - James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. 10:1-10:36 - Fatima M. Anwar, Mani B. Srivastava:
A Case for Feedforward Control with Feedback Trim to Mitigate Time Transfer Attacks. 11:1-11:25
Volume 23, Number 3, July 2020
- Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Privado: Privacy-preserving Group-based Advertising Using Multiple Independent Social Network Providers. 12:1-12:36 - Giada Sciarretta, Roberto Carbone, Silvio Ranise, Luca Viganò:
Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login. 13:1-13:37 - Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen:
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy. 14:1-14:28 - Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim:
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure. 15:1-15:32 - Darren Hurley-Smith, Julio C. Hernandez-Castro:
Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators. 16:1-16:25
Volume 23, Number 4, August 2020
- Mohamed Nabeel, Issa M. Khalil, Bei Guan, Ting Yu:
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference. 17:1-17:36 - Syed Zain R. Rizvi, Philip W. L. Fong:
Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model. 18:1-18:33 - Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis, Jason Polakis:
The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks. 19:1-19:31 - Bert Abrath, Bart Coppens, Jens Van den Broeck, Brecht Wyseur, Alessandro Cabutto, Paolo Falcarin, Bjorn De Sutter:
Code Renewability for Native Software Protection. 20:1-20:31 - Sagar Samtani, Hongyi Zhu, Hsinchun Chen:
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF). 21:1-21:33 - Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee, Konstantin Beznosov, Hyoungshick Kim:
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better? 22:1-22:32
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.