Security Research Papers







Conferences related to Network Security

Back to Top

2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

Promote the exchange of ideas between academia and industry in the field of computer and networks dependability

  • 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    The IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) is the most prestigious international forum for presenting advanced and innovative research results, problem solutions, practices, insights on new challenges in the field of dependable computing and security. The whole spectrum of IT systems and application areas with stringent relevant dependability and security concerns are of interest to DSN. All aspects of dependable and secure systems and networks are within the scope of DSN, including innovative architectures, protocols and algorithms, models for performance and dependability evaluation, as well as, experimentation and assessment of dependable and secure systems and networks.

  • 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    Presenting the very best research results, problem solutions and insights on new challenges in the field of dependable computing and security.

  • 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    Dependable systems must be reliable, trustable, available and resilient to malicious attacks, accidental faults and design errors to attend our society, strongly dependent on computers and software products. Computermalfunctioning in various application areas, such as bank transactions, transportation, medical equipment, satellites, telecommunication networks among others, can impact people who use vulnerable systems and services.The researches developed in these areas aiming for dependability of systems and software can find in DSN the most important conference in the world to discuss how such systems should be developed, tested and evaluated.The conference offers an international forum to present research results, solutions to problems, insights into emerging challenges in a rich program addressing multiple facets of dependable and secure computing, and network.

  • 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    All aspects of dependability and security, from hardware, software, systems, and networking perspectives.

  • 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    DSN is the premier international conference for presenting research results, problem solutions, and insight on new challenges facing the field of dependability and security. DSN explores the fusion between security and dependability, addressing the need to simultaneously fight against cyber attacks, accidental faults, design errors, and unexpected operating conditions.

  • 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    DSN is the premier international conference for presenting research results, problem solutions, and insight on new challenges facing the field of dependability and security. DSN explores the fusion between security and dependability, addressing the need to simultaneously fight against cyber attacks, accidental faults, design errors, and unexpected operating conditions.

  • 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN)

    DSN is the premier international conference on dependability and security. Topics include Architectures for Dependable, Secure and Resilient Computer Systems; Dependability Modeling and Prediction; Dependability and security of hardware technologies; Fault-Toleranc; Internet Dependability; Intrusion-Tolerance; Safety-Critical Systems; Software Testing, V&V; Software Reliability; Performance and Dependability Assessment;; Failure, Vulnerability and Threat Analysis.

  • 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)

    DSN is the premier international conference for presenting the very best research results, problem solutions, and insight on new challenges facing the field of dependability and security. As in previous years, DSN 2010 will incorporate the Dependable Computing and Communications Symposium (DCCS) and the Performance and Dependability Symposium (PDS). DSN's schedule will include workshops and tutorials on the first day and a three day conference with parallel tracks that include full papers, a student forum,

  • 2009 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)

    DSN is the main forum for presenting and discussing latest results on the dependability and security of computer systems and networks, covering design, architecture, validation and evaluation related challenges and solutions.

  • 2008 IEEE International Conference on Dependable Systems & Networks With FTCS & DCC (DSN)
  • 2007 IEEE International Conference on Dependable Systems & Networks With FTCS & DCC (DSN)
  • 2006 IEEE International Conference on Dependable Systems & Networks With FTCS & DCC (DSN)
  • 2005 IEEE International Conference on Dependable Systems & Networks With FTCS & DCC (DSN)

2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions

  • 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)

    IEEE CCNC 2017 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions

  • 2016 13th IEEE AnnualConsumer Communications & Networking Conference (CCNC)

    IEEE CCNC 2016 will have separate research sessions and industry sessions. The research sessions will present the latest developments and technical solutions in the areas of home networking, consumer networking, mobile networking, social networking, enabling technologies (such as middleware), and novel applications and services.

  • 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)

    Dedicated to the advancement of consumer networking technologies, applications and services.

  • 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)

    IEEE Consumer Communications and Networking Conference, sponsored by IEEE Communications Society, is a major annual international conference organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of consumer communications and networking.

  • 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC)

    IEEE Consumer Communications and Networking Conference, sponsored by IEEE Communications Society, is a major annual international conference organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of consumer communications and networking.

  • 2012 IEEE Consumer Communications and Networking Conference (CCNC)

    is a major annual international conference organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of consumer communications and networking.

  • 2011 IEEE Consumer Communications and Networking Conference (CCNC)

    Is major annual international conference organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of consumer communications and networking.

  • 2010 7th IEEE Consumer Communications and Networking Conference (CCNC)

    Consumer Communications and Networking Conference (CCNC) was developed by the IEEE Communications Society in order to bring together the latest in communications and networking technology with the utilization of that technology in consumer communications and networking devices, services and applications.

  • 2009 6th IEEE Consumer Communications and Networking Conference (CCNC)

    IEEE Consumer Communications and Networking Conference, sponsored by IEEE Communications Society, is a major annual international conference organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of consumer communications and networking. CCNC 2009 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware), and novel applicat

  • 2008 5th IEEE Consumer Communications and Networking Conference (CCNC)
  • 2007 4th IEEE Consumer Communications and Networking Conference (CCNC)
  • 2006 3rd IEEE Consumer Communications and Networking Conference (CCNC)
  • 2005 2nd IEEE Consumer Communications and Networking Conference (CCNC)
  • 2004 1st IEEE Consumer Communications and Networking Conference (CCNC)

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field

  • 2017 IEEE Trustcom/BigDataSE/ICESS

    The scope of these conferences includes:Trusted computing platformTrusted network computingTrusted operating systemsTrusted software and applicationsTrust in social networks, Network securityComputer securityDatabase securityWeb applications security, Privacy in Web-based applications and servicesPrivacy in database systemsPrivacy in parallel and distributed systems, Big Data novel theory, algorithm and applicationsBig Data standardsBig Data mining and analyticsBig Data Infrastructure, MapReduce and Cloud ComputingBig Data visualizationBig Data curation and managementBig Data semantics, scientific discovery and intelligence, Security, privacy, trust, and legal issues to big data, MapReduce for Big Data processing, resource scheduling and SLAPerformance characterization, evaluation and optimization, Systems, Models and Algorithm, Design Methodology and Tools, Applications and Interdisciplinary Topics

  • 2016 IEEE Trustcom/BigDataSE/I¿SPA

    This conference is created to provide a prime international forum for researchers, industry practitioners and domain experts to exchange the latest advances in trusted computing and communications, concurrent and parallel systems, and Big Data and broadly related areas.

  • 2015 IEEE Trustcom/BigDataSE/I¿SPA

    Computer Science, in particular trust, security, privacy, big data, parallel and distributed processing, use of these in software defined networks and 5G

  • 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

    Trust, Security and Privacy in Computing and Communications

  • 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

    Trust, Security and Privacy in Computing and Communications

  • 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

    TrustCom-2012 is an international conference for presenting and discussing emerging ideas and trends in trusted computing, communications, and networks from both the research community as well as the industry. Topics of interest include, but are not limited to Trust, Security, Privacy. TrustCom has a co-located conference IUCC-2012.

  • 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

    The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)
  • 2007 9th International Conference Advanced Communication Technology (ICACT)
  • 2006 8th International Conference Advanced Communication Technology (ICACT)
  • 2005 7th International Conference Advanced Communication Technology (ICACT)
  • 2004 6th International Conference Advanced Communication Technology (ICACT)

2018 26th Signal Processing and Communications Applications Conference (SIU)

The general scope of the conference ranges from signal and image processing to telecommunication, and applications of signal processing methods in biomedical and communication problems.

  • 2017 25th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing and Communication Applications (SIU) conference is the most prominent scientific meeting on signal processing in Turkey bringing together researchers working in signal processing and communication fields. Topics include but are not limited to the areas of research listed in the keywords.

  • 2016 24th Signal Processing and Communication Application Conference (SIU)

    Signal Processing Theory, Statistical Signal Processing, Nonlinear Signal Processing, Adaptive Signal Processing, Array and Multichannel Signal Processing, Signal Processing for Sensor Networks, Time-Frequency Analysis, Speech / Voice Processing and Recognition, Computer Vision, Pattern Recognition, Machine Learning for Signal Processing, Human-Machine Interaction, Brain-Computer Interaction, Signal-Image Acquisition and Generation, image Processing, video Processing, Image Printing and Presentation, Image / Video / Audio browsing and retrieval, Image / Video / Audio Watermarking, Multimedia Signal Processing, Biomedical Signal Processing and Image Processing, Bioinformatics, Biometric Signal-Image Processing and Recognition, Signal Processing for Security and Defense, Signal and Image Processing for Remote Sensing, Signal Processing Hardware, Signal Processing Education, Radar Signal Processing, Communication Theory, Communication Networks, Wireless Communications

  • 2015 23th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing Theory Statistical Signal Processing Nonlinear Signal Processing Adaptive Signal Processing Array and Multichannel Signal Processing Signal Processing for Sensor Networks Time-Frequency Analysis Speech / Voice Processing and Recognition Computer Vision Pattern Recognition Machine Learning for Signal Processing Human-Machine Interaction Brain-Computer Interaction Signal-Image Acquisition and Generation image Processing video Processing Image Printing and Presentation Image / Video / Audio browsing and retrieval Image / Video / Audio Watermarking Multimedia Signal Processing Biomedical Signal Processing and Image Processing Bioinformatics Biometric Signal-Image Processing and Recognition Signal Processing for Security and Defense Signal and Image Processing for Remote Sensing Signal Processing Hardware Signal Processing Education Radar Signal Processing Communication Theory Communication Networks Wireless Communications

  • 2014 22nd Signal Processing and Communications Applications Conference (SIU)

    SIU will be held in Trabzon, Turkey at the Karadeniz Technical University Convention and Exhibition Centre on April 23, 2014. SIU is the largest and most comprehensive technical conference focused on signal processing and its applications in Turkey. Last year there were 500 hundred participants. The conference will feature renowned speakers, tutorials, and thematic workshops. Topics include but are not limited to: Signal Procesing, Image Processing, Communication, Computer Vision, Machine Learning, Biomedical Signal Processing,

  • 2013 21st Signal Processing and Communications Applications Conference (SIU)

    Conference will discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. Conference will also include invited lectures, tutorials and special sessions.

  • 2012 20th Signal Processing and Communications Applications Conference (SIU)

    Conference will discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. Conference will also include invited lectures, tutorials and special sessions.

  • 2011 19th Signal Processing and Communications Applications Conference (SIU)

    Conference will bring together academia and industry professionals as well as students and researchers to present and discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. The Conference will also include invited lectures, tutorials and special sessions.

  • 2010 IEEE 18th Signal Processing and Communications Applications Conference (SIU)

    S1.Theory of Signal-Processing S2.Statistical Signal-Processing S3.Multimedia Signal-Processing S4.Biomedical Signal-Processing S5.Sensor Networks S6.Multirate Signal-Processing S7.Pattern Recognition S8.Computer Vision S9.Adaptive Filters S10.Image/Video/Speech Browsing, Retrieval S11.Speech/Audio Coding S12.Speech Processing S13.Human-Machine Interfaces S14.Surveillance Signal Processing S15.Bioinformatics S16.Self-Learning S17.Signal-Processing Education S18.Signal-Processing Systems S1

  • 2009 IEEE 17th Signal Processing and Communications Applications Conference (SIU)

    The scope of the conference is to cover recent topics in theory and applications of Signal Processing and Communications.

  • 2008 IEEE 16th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing, Image Processing, Speech Processing, Pattern Recognition, Human Computer Interaction, Communication, Video and Speech indexing, Computer Vision, Biomedical Signal Processing

  • 2007 IEEE 15th Signal Processing and Communications Applications (SIU)
  • 2006 IEEE 14th Signal Processing and Communications Applications (SIU)
  • 2005 IEEE 13th Signal Processing and Communications Applications (SIU)
  • 2004 IEEE 12th Signal Processing and Communications Applications (SIU)

More Conferences

Periodicals related to Network Security

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


More Periodicals

Most published Xplore authors for Network Security

Back to Top

No authors for "Network Security"


Xplore Articles related to Network Security

Back to Top

No Xplore Articles are currently tagged "Network Security"


Standards related to Network Security

Back to Top

IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


IEEE Standard Specifications for Public-Key Cryptography

Specifications of common public-key cryptographic techniques, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys.


IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques

Specifications of common public-key cryptographic techniques supplemental to those considered in IEEE Std 1363-2000, including mathematical primitives for secret value (key) derivation, public-key encryption, digital signatures, and identification, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is not restricted.


More Standards


  •   

    An Experience Sampling Study of User Reactions to Browser Warnings in the Field

    Rob Reeder, Adrienne Porter Felt, Sunny Consolvo, Nathan Malkin, Chris Thompson, Serge Egelman

    CHI (2018) (to appear)

  •    

    Learning Differentially Private Recurrent Language Models

    Brendan McMahan, Daniel Ramage, Kunal Talwar, Li Zhang

    International Conference on Learning Representations (ICLR) (2018)

  •    

    Scalable Private Learning with PATE

    Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Úlfar Erlingsson

    ICLR 2018 (2018) (to appear)

  •    

    The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets

    Nicholas Carlini, Chang Liu, Jernej Kos, Úlfar Erlingsson, Dawn Song

    ArXiv e-prints, vol. 1802.08232 (2018)

  •    

    152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy Users

    Robert W. Reeder, Iulia Ion, Sunny Consolvo

    IEEE Security and Privacy (2017)

  •   

    A Predictive Model for User Motivation and Utility Implications of Privacy Protection Mechanisms in Location Check-Ins

    Kevin Huguenin, Igor Bilogrevic, Joana Soares Machado, Stefan Mihaila, Reza Shokri, Italo Dacosta, Jean-Pierre Hubaux

    IEEE Transactions on Mobile Computing (2017)

  •    

    A Vendor-Agnostic Root of Trust for Measurement

    Jon McCune, Rick Altherr

    Google Inc. (2017)

  •    

    AES-VCM, AN AES-GCM CONSTRUCTION USING AN INTEGER-BASED UNIVERSAL HASH FUNCTION

    Ed Knapp

    (2017)

  •    

    BeyondCorp: The User Experience

    Victor Manuel Escobedo, Filip Zyzniewski, Betsy (Adrienne Elizabeth) Beyer, Max Saltonstall

    Login, vol. tbd (2017), tbd

  •    

    Code-reuse attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets

    Sebastian Lekies, Krzysztof Kotowicz, Samuel Groß, Eduardo Vela Nava, Martin Johns

    ACM CCS (2017)

  •    

    Cyber, Nano, and AGI Risks: Decentralized Approaches to Reducing Risks

    Allison Duettmann, Christine Peterson, Mark S. Miller

    The First Colloquium On Catastrophic And Existential Risk (2017)

  •    

    Data breaches, phishing, or malware? Understanding the risks of stolen credentials

    Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, Elie Bursztein

    (2017)

  •    

    Exploring decision making with Android's runtime permission dialogs using in-context surveys

    Bram Bonné, Sai Teja Peddinti, Igor Bilogrevic, Nina Taft

    Thirteenth Symposium on Usable Privacy and Security (SOUPS), Usenix (2017)

  •    

    Glimmers: Resolving the Privacy/Trust Quagmire

    David Lie, Petros Maniatis

    ACM Hot Topics in Operating Systems (HotOS), ACM SIGOPS, Whistler, British Columbia, Canada (2017)

  •    

    Hiding Images in Plain Sight: Deep Steganography

    Shumeet Baluja

    Neural Information Processing Systems, NIPS (2017)

  •    

    Measuring HTTPS adoption on the web

    Adrienne Porter Felt, Richard Barnes, April King, Chris Palmer, Chris Bentzel, Parisa Tabriz

    USENIX Security (2017)

  •    

    Migrating to BeyondCorp: Maintaining Productivity While Improving Security

    Betsy (Adrienne Elizabeth) Beyer, Colin McCormick Beske, Jeff Peck, Max Saltonstall

    Login, vol. Summer 2017, VOl 42, No 2 (2017)

  •    

    On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches

    Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, H. Brendan McMahan, Nicolas Papernot, Ilya Mironov, Kunal Talwar, Li Zhang

    IEEE 30th Computer Security Foundations Symposium (CSF), IEEE (2017), pp. 1-6

  •    

    Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers

    Thurston H.Y. Dang, Petros Maniatis, David Wagner

    USENIX Security, USENIX, Vancouver, BC, Canada (2017) (to appear)

  •    

    Pinning Down Abuse on Google Maps

    Danny Y. Huang, Doug Grundman, Kurt Thomas, Abhishek Kumar, Elie Bursztein, Kirill Levchenko, Alex C. Snoeren

    Proceedings of the International Conference on World Wide Web (WWW) (2017)

  •    

    Practical Cryptanalysis of Json Web Token and Galois Counter Mode's Implementations

    Quan Nguyen

    Real World Crypto Conference 2017, http://www.realworldcrypto.com/rwc2017

  •   

    Privacy Requirements: Present & Future

    Pauline Anthonysamy, Awais Rashid, Ruzanna Chitchyan

    39th International Conference on Software Engineering (2017)

  •   

    Privacy and security experiences and practices of survivors of intimate partner abuse

    Anna Turner, Cori Manthorne, Elizabeth Churchill, Jill Palzkill Woelfer, Katie O'Leary, Manya Sleeper, Martin Shelton, Sunny Consolvo, Tara Matthews

    IEEE Security & Privacy Magazine (2017)

  •    

    RFC 8110 - Opportunistic Wireless Encryption

    Dan Harkins, Warren Kumari

    IETF (2017)

  •    

    RFC 8145 - Signaling Trust Anchor Knowledge in DNS Security Extensions (DNSSEC)

    Duane Wessels, Verisign, Warren Kumari, Google, Paul Hoffman, ICANN

    Internet Engineering Task Force (IETF), IETF (2017)

  •    

    RFC 8198 - Aggressive Use of DNSSEC-Validated Cache

    Kazunori Fujiwara, Akira Kato, Warren Kumari

    Internet Engineering Task Force (IETF) (2017)

  •    

    Rényi Differential Privacy

    Ilya Mironov

    30th IEEE Computer Security Foundations Symposium (CSF), pp. 263-275

  •    

    Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data

    Nicolas Papernot, Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, Kunal Talwar

    Proceedings of the International Conference on Learning Representations (2017)

  •    

    Stories from survivors: Privacy & security practices when coping with intimate partner abuse

    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo

    CHI '17 Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, New York, NY, USA (2017), pp. 2189-2201

  •   

    The Anatomy of Smartphone Unlocking - Why and How Android Users Around the World Lock their Phones

    Nathan Malkin, Marian Harbach, Alexander De Luca, Serge Egelman

    GetMobile: Mobile Comp. and Comm., vol. 20 (2017), pp. 42-46

  •    

    The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication

    Martin Abadi, Bruno Blanchet, Cedric Fournet

    JACM (2017) (to appear)

  •    

    The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game

    Sylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque, Asad Syed

    IEEE Transactions on Software Engineering, vol. Issue: 99 (2017)

  •    

    Understanding the Mirai Botnet

    Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou

    Proceedings of the 26th USENIX Security Symposium (2017)

  •    

    Where the Wild Warnings Are: Root Causes of Chrome Certificate Errors

    Mustafa Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz

    Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications Security (2017)

  •    

    "If You Put All The Pieces Together..." - Attitudes Towards Data Combination and Sharing Across Services and Companies

    Igor Bilogrevic, Martin Ortlieb

    ACM CHI (2016)

  •    

    A Week to Remember: The Impact of Browser Warning Storage Policies

    Joel Weinberger, Adrienne Porter Felt

    SOUPS 2016

  •    

    Abstract Data Types in Object-Capability Systems

    James Noble, Sophia Drossopoulou, Mark S. Miller, Toby Murray, Alex Potanin

    ECOOP 2016 (2016)

  •    

    Beyond Corp: The Access Proxy

    Batz Spear, Betsy (Adrienne Elizabeth) Beyer, Luca Cittadini, Max Saltonstall

    Login (2016)

  •    

    BeyondCorp: Design to Deployment at Google

    Barclay Osborn, Justin McWilliams, Betsy Beyer, Max Saltonstall

    ;login:, vol. 41 (2016), pp. 28-34

  •   

    Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries

    Giulia Fanti, Vasyl Pihur, Úlfar Erlingsson

    Proceedings on Privacy Enhancing Technologies (PoPETS), vol. issue 3, 2016 (2016)

  •    

    CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy

    Lukas Weichselbaum, Michele Spagnuolo, Sebastian Lekies, Artur Janc

    Proceedings of the 23rd ACM Conference on Computer and Communications Security, ACM, Vienna, Austria (2016)

  •    

    Cloak of Visibility: Detecting When Machines Browse a Different Web

    Luca Invernizzi, Kurt Thomas, Alexandros Kapravelos, Oxana Comanescu, Jean-Michel Picod, Elie Bursztein

    Proceedings of the 37th IEEE Symposium on Security and Privacy (2016)

  •    

    Content Sniffing with Comma Chameleon

    Gábor Molnár, Krzysztof Kotowicz

    PoC||GTFO, vol. 12 (2016)

  •   

    DROWN: Breaking TLS using SSLv2

    Christoph Paar, David Adrian, Emilia Kasper, J. Alex Halderman, Jens Steube, Juraj Somorovsky, Luke Valenta, Maik Dankel, Nadia Heninger, Nimrod Aviram, Sebastian Schinzel, Shaanan Cohney, Susanne Engels, Viktor Dukhovni, Yuval Shavitt

    25th USENIX Security Symposium (2016)

  •    

    Data-driven software security: Models and methods

    Úlfar Erlingsson

    IEEE Computer Security Foundations Symposium (2016)

  •    

    Deep Learning with Differential Privacy

    Martin Abadi, Andy Chu, Ian Goodfellow, Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang

    23rd ACM Conference on Computer and Communications Security (ACM CCS) (2016), pp. 308-318

  •    

    Discrete Distribution Estimation under Local Privacy

    Peter Kairouz, Keith Bonawitz, Daniel Ramage

    ICML (2016)

  •   

    Distributed Authorization in Vanadium

    Ankur Taly, Asim Shankar

    Foundations of Security Analysis and Design VIII, Springer-Verlag (2016)

  •    

    Ephemeral Identifiers: Mitigating Tracking & Spoofing Threats to BLE Beacons

    Avinatan Hassidim, Yossi Matias, Moti Yung, Alon Ziv

    Google (2016)

  •    

    Expert and Non-Expert Attitudes towards (Secure) Instant Messaging

    Alexander De Luca, Sauvik Das, Martin Ortlieb, Iulia Ion, Ben Laurie

    Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), USENIX Association, Denver, CO, pp. 147-157

  •    

    Fast keyed hash/pseudo-random function using SIMD multiply and permute

    Jyrki Alakuijala, Bill Cox, Jan Wassenberg

    Google Research (2016)

  •    

    Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE

    Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila

    23rd ACM Conference on Computer and Communications Security (ACM CCS) (2016) (to appear)

  •    

    Harvesting the Low-hanging Fruits: Defending Against Automated Large-Scale Cyber-Intrusions by Focusing on the Vulnerable Population

    H. Halawa, K. Beznosov, Y. Boshmaf, B. Coskun, E. Santos-Neto, M. Ripeanu

    New Security Paradigms Workshop (NSPW) 2016, ACM, http://www.nspw.org/2016 (to appear)

  •    

    Inferring semantic mapping between policies and code: the clue is in the language

    Pauline Anthonysamy, Matthew Edwards, Chris Weichel, Awais Rashid

    International Symposium on Engineering Secure Software and Systems, Springer (2016)

  •    

    Intuitions, analytics, and killing ants: Inference literacy of high school-educated adults in the US

    Jeff Warshaw, Nina Taft, Allison Woodruff

    SOUPS 2016

  •    

    Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software

    Kurt Thomas, Juan Antonio Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-André (MAD) Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panos Mavrommatis, Niels Provos, Elie Bursztein, Damon McCoy

    Proceedings of the USENIX Security Symposium (2016)

  •    

    Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking

    Marian Harbach, Alexander De Luca, Nathan Malkin, Serge Egelman

    Proceedings of the 34th Annual ACM Conference on Human Factors in Computing Systems (CHI'16), ACM, New York, NY, USA (2016) (to appear)

  •    

    Learning to Protect Communications with Adversarial Neural Cryptography

    Martín Abadi, David G. Andersen

    arXiv (2016)

  •    

    Permission and Authority Revisited: towards a formalization

    Sophia Drossopoulou, James Noble, Mark S. Miller, Toby Murray

    Workshop on Formal Techniques for Java-like Programs, ACM (2016)

  •    

    Picasso: Lightweight Device Class Fingerprinting for Web Clients

    Elie Bursztein, Artem Malyshey, Tadek Pietraszek, Kurt Thomas

    Workshop on Security and Privacy in Smartphones and Mobile Devices (2016)

  •    

    Practical Secure Aggregation for Federated Learning on User-Held Data

    Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth

    NIPS Workshop on Private Multi-Party Machine Learning (2016)

  •    

    Privacy Mediators: Helping IoT Cross the Chasm

    Nigel Davies, Nina Taft, Mahadev Satyanarayanan, Sarah Clinch, Brandon Amos

    Hot Topics in Mobile Computing (Hot Mobile), ACM (2016)

  •   

    Private Service Discovery and Mutual Authentication for the Internet of Things

    Ankur Taly, Asim Shankar, Dan Boneh, David Wu

    European Symposium on Research in Computer Security (ESORICS), Spinger-Verlag (2016), pp. 301-319

  •    

    Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension

    Frank Li, Grant Ho, Eric Kuan, Yuan Niu, Lucas Ballard, Kurt Thomas, Elie Bursztein, Vern Paxson

    International World Wide Web Conference (2016)

  •    

    Rethinking Connection Security Indicators

    Adrienne Porter Felt, Robert W Reeder, Alex Ainslie, Helen Harris, Max Walker, Chris Thompson, Mustafa Acer, Elisabeth Morant, Sunny Consolvo

    SOUPS (2016)

  •    

    SAC073 - SSAC Comments on Root Zone Key Signing Key Rollover Plan

    Warren Kumari, Patrik Fältström

    ICANN Security and Stability Advisory Committee (SSAC) Reports and Advisories, ICANN (2016), pp. 41

  •    

    Security Keys: Practical Cryptographic Second Factors for the Modern Web

    Juan Lang, Alexei Czeskis, Dirk Balfanz, Marius Schilder

    Financial Cryptography (2016)

  •    

    The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges

    Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, Michael Bailey

    Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (2016)

  •    

    The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens

    Marian Harbach, Alexander De Luca, Serge Egelman

    Proceedings of the 34th Annual ACM Conference on Human Factors in Computing Systems (CHI'16), ACM, New York, NY, USA (2016) (to appear)

  •   

    The Rowhammer Attack Injection Methodology

    Keun Soo Yim

    In Proceedings of the IEEE Symposium on Reliable Distributed Systems (SRDS) (2016), pp. 1-10

  •    

    Users Really Do Plug in USB Drives They Find

    Matthew Tischer, Zakir Durumeric, Sam Foster, Sunny Duan, Alec Mori, Elie Bursztein, Michael Bailey

    Security and Privacy, IEEE (2016)

  •   

    What Mobile Ads Know About Mobile Users

    Daehyeok Kim, Sooel Son, Vitaly Shmatikov

    NDSS 2016

  •    

    ÜBERSPARK : Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor

    Amit Vasudevan, Sagar Chaki, Petros Maniatis, Limin Jia, Anupam Datta

    USENIX Security, USENIX (2016)

  •    

    (Smart) watch your taps: side-channel keystroke inference attacks using smartwatches

    Anindya Maiti, Murtuza Jadliwala, Jibo He, Igor Bilogrevic

    ACM International Symposium on Wearable Computers (2015), pp. 27-30

  •  

    Access Control and the Internet of Things

    Vinton G. Cerf

    IEEE Internet Computing, vol. 19 (2015), pp. 96-

  •    

    Ad Injection at Scale: Assessing Deceptive Advertisement Modifications

    Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab

    Proceedings of the IEEE Symposium on Security and Privacy (2015)

  •    

    Apples and Oranges: Detecting Least-Privilege Violators with Peer Group Analysis

    Iulia Ion, Suman Jana, Úlfar Erlingsson

    CoRR, vol. abs/1510.07308 (2015)

  •    

    Attitudes Toward Vehicle-Based Sensing and Recording

    Manya Sleeper, Sebastian Schnorf, Brian Kemler, Sunny Consolvo

    Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, ACM, pp. 1017-1028

  •    

    Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement

    Richard Barnes, Bruce Schneier, Cullen Jennings, Ted Hardie, Brian Trammel, Christian Huitema, Daniel Borkman

    IETF RFCs, Internet Engineering Task Force (2015), pp. 24

  •   

    Distributed Authorization With Distributed Grammars

    Martin Abadi, Mike Burrows, Himabindu Pucha, Adam Sadovsky, Asim Shankar, Ankur Taly

    Programming Languages with Applications to Biology and Security, Springer International Publishing Switzerland, Gewerbestrasse 11 CH-6330 Cham (ZG) Switzerland (2015), pp. 10-26

  •    

    Fast and Secure Three-party Computation: The Garbled Circuit Approach

    Payman Mohassel, Mike Rosulek, Ye Zhang

    The 22nd ACM Conference on Computer and Communications Security, ACM (2015)

  •    

    Framing Dependencies Introduced by Underground Commoditization

    Kurt Thomas, Danny Huang, David Wang, Elie Bursztein, Chris Grier, Thomas J. Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna

    Workshop on the Economics of Information Security (2015)

  •    

    GraphSC: Parallel Secure Computation Made Easy

    Kartik Nayak, Xiao S. Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine Shi

    IEEE Symposium on Security and Privacy, IEEE (2015)

  •    

    Improving SSL Warnings: Comprehension and Adherence

    Adrienne Porter Felt, Alex Ainslie, Robert W. Reeder, Sunny Consolvo, Somas Thyagaraja, Alan Bettes, Helen Harris, Jeff Grimes

    Proceedings of the Conference on Human Factors and Computing Systems, ACM (2015)

  •    

    Internal Access Controls

    Geetanjali Sampemane

    Communications of the ACM, vol. 58 (2015), pp. 62-65

  •    

    Managing your Private and Public Data: Bringing down Inference Attacks against your Privacy

    Amy Zhang, Branislav Kveton, Flavio du Pin Calmon, Nadia Fawaz, Nina Taft

  • 0 thoughts on “Security Research Papers”

      -->

    Leave a Comment

    Your email address will not be published. Required fields are marked *