î•ñƒZƒLƒ…ƒŠƒeƒB“Á˜_
‹e’r@_–¾
‰Î—j3ŒÀ@313 ‹³Žº@(2017”NtƒZƒƒXƒ^[j |
|
|
|
|
|
|
|
|
|
|
|
No |
Date |
@ |
Contents |
Author |
Issue |
Keyword |
|
|
1 |
2017/4/11 |
@ |
Guidance |
@ |
@ |
@ |
|
|
2 |
2017/4/18 |
@ |
Building
a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and
Data Dictionaries |
Giulia Fanti and Vasyl Pihur and _lfar Erlingsson |
PETs 16 |
ƒvƒ‰ƒCƒoƒV[C@Šm—¦˜_ |
|
|
@ |
2017/4/25 |
@ |
‹xu |
@ |
@ |
@ |
|
|
@ |
2017/5/2 |
@ |
j“ú |
@ |
@ |
@ |
|
|
3 |
2017/5/9 |
@ |
Linking
Health Records for Federated Query Processing |
Rinku Dewri , Toan Ong, and Ramakrishna Thurimella |
PETs 16 |
ˆÃ†ƒvƒƒgƒRƒ‹Cƒvƒ‰ƒCƒoƒV[ |
|
|
4 |
2017/5/16 |
@ |
Understanding
Password Choices: How Frequently Entered Passwords Are Re-used across
Websites |
Rick
Wash and Emilee Rader, Michigan State University; Ruthie Berman, Macalester
College; Zac Wellmer |
Soups 16 |
ƒpƒXƒ[ƒhC’²¸ |
|
|
5 |
2017/5/23 |
@ |
You
Are Who You Know and How You Behave: Attribute Inference Attacks via Users'
Social Friends and Behaviors |
Neil
Zhenqiang Gong, Iowa State University; Bin Liu, Rutgers University |
Usenix 16 |
SNS, ‘®«„’è |
|
|
6 |
2017/5/30 |
@ |
Internet
Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web
Tracking from 1996 to 2016 |
Adam
Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner,
University of Washington |
Usenix 16 |
Tracking,
ƒvƒ‰ƒCƒoƒV[ |
|
|
7 |
2017/6/6 |
@ |
Virtual
U: Defeating Face Liveness Detection by Building Virtual Models from Your
Public Photos |
Yi Xu, True
Price, Jan-Michael Frahm, and Fabian Monrose, The University of North
Carolina at Chapel Hill |
Usenix 16 |
VR, Šç”Fޝ |
|
|
8 |
2017/6/13 |
@ |
Internet-scale
Probing of CPS: Inference, Characterization and Orchestration Analysis |
Claude
Fachkha, Elias Bou-Harb, Anastasis Keliris, Nasir Memon, Mustaque Ahamad |
NDSS 17 |
CPS,
IoT, ƒlƒbƒgƒ[ƒNƒZƒLƒ…ƒŠƒeƒB |
|
|
9 |
2017/6/20 |
@ |
P2P
Mixing and Unlinkable Bitcoin Transactions |
Tim
Ruffing, Pedro Moreno-Sanchez, Aniket Kate |
NDSS 17 |
ˆÃ†’ʉÝC“½–¼« |
|
|
10 |
2017/6/27 |
@ |
On the Instability of Bitcoin
Without the Block Reward |
Miles
Carlsten Harry Kalodner S. Matthew Weinberg Arvind Narayanan |
CCS 16 |
ƒrƒbƒgƒRƒCƒ“C’²¸ |
|
|
11 |
2017/7/4 |
@ |
Prepose:
Privacy, Security, and Reliability for Gesture-Based Programming |
Lucas
Silva Figueiredo; Benjamin Livshits; David Molnar; Margus
Veanes |
IEEESP 16 |
”FØCƒWƒFƒXƒ`ƒƒ[ |
|
|
@ |
2017/7/11 |
@ |
‹xu |
@ |
@ |
@ |
|
|
12 |
2017/7/18 |
@ |
Users
Really Do Plug in USB Drives They Find |
Matthew
Tischer; Zakir Durumeric; Sam Foster; Sunny Duan; Alec Mori; Elie Bursztein;
Michael Bailey |
IEEESP 16 |
lŠÔ—v‘fC’²¸ |
|
|
13 |
2017/7/25 |
@ |
Cloak
of Visibility: Detecting When Machines Browse a Different Web |
Luca
Invernizzi; Kurt Thomas; Alexandros Kapravelos; Oxana Comanescu; Jean-Michel
Picod; Elie Bursztein |
IEEESP 16 |
ƒEƒFƒuCƒNƒ[ƒLƒ“ƒO’²¸ |
|
|
14 |
•âu |
@ |
Beauty
and the Beast: Diverting Modern Web Browsers to Build Unique Browser
Fingerprints |
Pierre Laperdrix; Walter
Rudametkin; Benoit Baudry |
IEEESP 16 |
ƒEƒFƒuCޝ•Ê |
|
|
@ |
@ |
@ |
@ |
@ |
@ |
@ |
|
|
|
|
|
¦
IEEESP (IEEE Symposium on Security and Privacy) |
|
|
|
|
|
|
|
CCS (ACM conference on
computer and communications security) |
|
|
|
|
|
|
KDD (ACM SIGKDD Int.
Conference on Knowledge Discovery and Data Mining) |
|
|
|
|
|
ECiInternational
Cryptology Conference EUROCRYPT) |
|
|
|
|
|
|
|
ASIACCSiACM@Symposium on InformAtion, Compuer and Communications
Security) |
|
|
|
|
|
ICISC(International
Conference on Information Security and Cryptology) |
|
|
|
|
|
|
CRYPTO (IACR
International Cryptology Conference) |
|
|
|
|
|
|
|
CT-RSA(RSA Security
Conference Cryptographers Track) |
|
|
|
|
|
|
|
RAID(Recent Advances in
Intrusion Detection) |
|
|
|
|
|
|
|
PAKDD (Pacific-Asia
Conference on Advances in Knowledge Discovery and Data Mining |
|
|
|
|
|
CCSW (ACM workshop on
Cloud computing security) |
|
|
|
|