Jump to content

Search results

  • Control to Enable Attribute-Based Messaging". IEEE Annual Computer Security Applications Conference. ACSAC '06. Afandi, Raja; Zhang, Jianqing; Hafiz, Munawar;...
    9 KB (796 words) - 22:57, 23 July 2023
  • Security Analysis of the Internet Chess Club". 21st Annual Computer Security Applications Conference (ACSAC'05). pp. 245–253. doi:10.1109/CSAC.2005.36. ISBN 0-7695-2461-3...
    8 KB (859 words) - 20:41, 23 September 2024
  • Generation in Software," acsac, pp. 129, 19th Annual Computer Security Applications Conference (ACSAC '03), 2003 "Fortuna on Bruce Schneier's website"...
    8 KB (925 words) - 17:57, 12 March 2024
  • Verifiable Identifiers in Middleware Security. 17th Annual Computer Security Applications Conference (ACSAC) Proceedings, pp. 450-459, IEEE Press, December...
    9 KB (1,182 words) - 14:34, 26 January 2024
  • Security Perceptions of Risk-based Authentication". Annual Computer Security Applications Conference. ACSAC '20. Austin, USA: Association for Computing Machinery...
    6 KB (692 words) - 16:30, 7 February 2024
  • text-password based authentication systems". 21st Annual Computer Security Applications Conference (ACSAC'05) (PDF). IEEE. pp. 473–482. doi:10.1109/CSAC...
    11 KB (1,369 words) - 23:31, 4 June 2024
  • Denial of Service Prevention. In Proceedings of the Annual Computer Security Applications Conference (ACSAC) 2009, pages 279-288, Honolulu, HI, Dec 2009. "Cyber...
    10 KB (1,672 words) - 21:41, 18 January 2024
  • Security Applications" (PDF). In Proceedings of 30th Annual Computer Security Applications Conference (ACSAC 2014). ACM. danielwilkerson.com DustMite, the general...
    5 KB (524 words) - 20:40, 26 June 2024
  • "Breaking e-Banking CAPTCHAs". Proceedings of 26th Annual Computer Security Applications Conference (ACSAC 2010). New York, NY, USA: ACM. pp. 171–180. doi:10...
    16 KB (1,996 words) - 21:40, 17 December 2023
  • security in new directions". "Test of Time Awards - Annual Computer Security Applications Conference (ACSAC)". www.acsac.org. "History". "Awardees". The Golden...
    8 KB (675 words) - 05:07, 31 July 2024
  • Thumbnail for Computer security conference
    2013". ACSAC. Retrieved 2013-04-05. "Past ACSACs - Annual Computer Security Applications Conference". ACSAC. Retrieved 2013-04-05. "Annual Symposium on Information...
    39 KB (3,860 words) - 03:59, 12 September 2024
  • commodity hardware" (PDF). Proceedings of the 30th Annual Computer Security Applications Conference. ACSAC '14. pp. 256–265. doi:10.1145/2664243.2664260....
    40 KB (4,704 words) - 10:45, 18 September 2024
  • Redirect URI Validation Falls Short, Literally". Annual Computer Security Applications Conference. ACSAC '23. New York, NY, USA: Association for Computing...
    38 KB (4,666 words) - 18:41, 10 September 2024
  • Thumbnail for Bitcoin
    lightweight bitcoin clients". Proceedings of the 30th Annual Computer Security Applications Conference. ACSAC '14. New York, NY, USA: Association for Computing...
    102 KB (8,279 words) - 17:57, 23 September 2024
  • Thumbnail for Aircrack-ng
    electronic control protocol". Proceedings of the 35th Annual Computer Security Applications Conference. ACSAC '19. New York, NY, USA: Association for Computing...
    53 KB (5,018 words) - 08:43, 4 September 2024
  • Thumbnail for Provenance
    Kevin (2012). "Hi-Fi". Proceedings of the 28th Annual Computer Security Applications Conference. Acsac '12. ACM. pp. 259–268. doi:10.1145/2420950.2420989...
    60 KB (7,129 words) - 20:16, 12 September 2024
  • Security Applications Conference, 2009. ACSAC '09. Annual Computer Security Applications Conference (Acsac). ISSN 1063-9527. Schmidt, Aubrey-Derrick; Bye...
    90 KB (10,980 words) - 14:20, 13 September 2024