-
1
-
-
85177677494
-
-
Essential Facts 2010.PDF
-
E. S. Association. Essential game facts 2009. http://www.theesa.com/ facts/pdfs/ESA Essential Facts 2010.PDF, 2010.
-
(2009)
Essential Game Facts
-
-
-
4
-
-
56449110617
-
Visual reverse engineering of binary and data files
-
G. Conti, E. Dean, M. Sinda, and B. Sangster. Visual reverse engineering of binary and data files. Visualization for Computer Security, pages 1-17, 2008.
-
(2008)
Visualization for Computer Security
, pp. 1-17
-
-
Conti, G.1
Dean, E.2
Sinda, M.3
Sangster, B.4
-
5
-
-
68949136946
-
Efficient robust private set intersection
-
D. Dachman-Soled, T. Malkin, M. Raykova, and M. Yung. Efficient robust private set intersection. In ACNS 2009, volume 5536 of LNCS, pages 125-142, 2009.
-
(2009)
ACNS 2009, Volume 5536 of LNCS
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
7
-
-
84989256579
-
-
C. engine team. Cheat engine. http://www.cheatengine.org/.
-
Cheat Engine
-
-
-
8
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS'03, pages 211-222, 2003.
-
(2003)
PODS'03
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
10
-
-
35048820609
-
Efficient private matching and set intersection
-
M. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Proc. of Eurocrypt 2004, volume 3027 of LNCS, pages 1-19, 2004.
-
(2004)
Proc. of Eurocrypt 2004, Volume 3027 of LNCS
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
11
-
-
74049146069
-
Battle of botcraft: Fighting bots in online games with human observational proofs
-
ACM
-
S. Gianvecchio, Z. Wu, M. Xie, and H. Wang. Battle of Botcraft: fighting bots in online games with human observational proofs. In Proceedings of the 16th ACM conference on Computer and communications security, pages 256-268. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 256-268
-
-
Gianvecchio, S.1
Wu, Z.2
Xie, M.3
Wang, H.4
-
13
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In Proc. of TCC'08, pages 155-175, 2008.
-
(2008)
Proc. of TCC'08
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
14
-
-
79955547393
-
Efficient set operations in the presence of malicious adversaries
-
C. Hazay and K. Nissim. Efficient set operations in the presence of malicious adversaries. In Proc. of PKC 2010, volume 6056 of LNCS, pages 312-331, 2010.
-
(2010)
Proc. of PKC 2010, Volume 6056 of LNCS
, pp. 312-331
-
-
Hazay, C.1
Nissim, K.2
-
15
-
-
70349142321
-
Hacking world of warcraft: An exercise in advanced rootkit design
-
G. Hoglund. Hacking world of warcraft: An exercise in advanced rootkit design. In Black Hat, 2006.
-
(2006)
Black Hat
-
-
Hoglund, G.1
-
17
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
-
S. Jarecki and X. Liu. Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection. In Proc. of TCC'09, pages 577-594, 2009.
-
(2009)
Proc. of TCC'09
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
22
-
-
85174664325
-
Distributed execution with remote audit
-
F. Monrose, P. Wyckoff, and A. Rubin. Distributed execution with remote audit. In NDSS, 1999.
-
(1999)
NDSS
-
-
Monrose, F.1
Wyckoff, P.2
Rubin, A.3
-
23
-
-
34547345984
-
Discovering an RC4 anomaly through visualization
-
DOI 10.1145/1179576.1179595, 1179595, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
D. Schweitzer and L. Baird. Discovering an RC4 anomaly through visualization. In Proceedings of the 3rd international workshop on Visualization for computer security, pages 91-94. ACM, 2006. (Pubitemid 47131417)
-
(2006)
Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 91-94
-
-
Schweitzer, D.1
Baird, L.2
-
24
-
-
85177678171
-
So many ways to slap a yo-ho:: Xploiting yoville and facebook for fun and profit
-
S. M. W. to
-
S. M. W. to Slap A Yo-Ho:: Xploiting Yoville, F. for Fun, P. Strace, S. Barnum, Evil Adam Smith, Kanen, and J. Tyson. So many ways to slap a yo-ho:: Xploiting yoville and facebook for fun and profit. Defcon 18, 2010.
-
(2010)
Defcon
, vol.18
-
-
Yo-Ho, S.A.1
Yoville, X.2
Fun, F.3
Strace, P.4
Barnum, S.5
Smith, E.A.6
Kanen7
Tyson, J.8
-
26
-
-
85177679526
-
-
Wikipedia. The blizzard warden. http://en.wikipedia.org/wiki/Warden- (software).
-
The Blizzard Warden
-
-
|