ACM CCS 2018(二).7z

上传者: 26816591 | 上传时间: 2019-12-21 20:36:25 | 文件大小: 152.27MB | 文件类型: 7z
2018年ACM CCS全年论文集,希望能够帮助到使用的人,我自己使用过程中整理的。

文件下载

资源详情

[{"title":"( 78 个子文件 152.27MB ) ACM CCS 2018(二).7z","children":[{"title":"TOR","children":[{"title":"122.pdf <span style='color:#111;'> 1.50MB </span>","children":null,"spread":false},{"title":"123.pdf <span style='color:#111;'> 1.97MB </span>","children":null,"spread":false},{"title":"125.pdf <span style='color:#111;'> 1.50MB </span>","children":null,"spread":false},{"title":"124.pdf <span style='color:#111;'> 3.37MB </span>","children":null,"spread":false}],"spread":true},{"title":"ML for Deanonymization","children":[{"title":"8.pdf <span style='color:#111;'> 2.79MB </span>","children":null,"spread":false},{"title":"7.pdf <span style='color:#111;'> 827.83KB </span>","children":null,"spread":false}],"spread":true},{"title":"ML 1","children":[{"title":"24.pdf <span style='color:#111;'> 1.81MB </span>","children":null,"spread":false},{"title":"22.pdf <span style='color:#111;'> 1.90MB </span>","children":null,"spread":false},{"title":"23.pdf <span style='color:#111;'> 2.29MB </span>","children":null,"spread":false},{"title":"21.pdf <span style='color:#111;'> 2.89MB </span>","children":null,"spread":false}],"spread":true},{"title":"Mobile Security 2","children":[{"title":"112.pdf <span style='color:#111;'> 2.66MB </span>","children":null,"spread":false},{"title":"111.pdf <span style='color:#111;'> 1.20MB </span>","children":null,"spread":false},{"title":"113.pdf <span style='color:#111;'> 1.86MB </span>","children":null,"spread":false},{"title":"110.pdf <span style='color:#111;'> 1.91MB </span>","children":null,"spread":false}],"spread":true},{"title":"Key Exchanges","children":[{"title":"130.pdf <span style='color:#111;'> 3.45MB </span>","children":null,"spread":false},{"title":"131.pdf <span style='color:#111;'> 7.16MB </span>","children":null,"spread":false}],"spread":true},{"title":"Web Security 1","children":[{"title":"96.pdf <span style='color:#111;'> 1.45MB </span>","children":null,"spread":false},{"title":"94.pdf <span style='color:#111;'> 2.44MB </span>","children":null,"spread":false},{"title":"95.pdf <span style='color:#111;'> 1.28MB </span>","children":null,"spread":false}],"spread":true},{"title":"Vulnerability Detection","children":[{"title":"118.pdf <span style='color:#111;'> 1.55MB </span>","children":null,"spread":false},{"title":"120.pdf <span style='color:#111;'> 1.34MB </span>","children":null,"spread":false},{"title":"121.pdf <span style='color:#111;'> 1.71MB </span>","children":null,"spread":false},{"title":"119.pdf <span style='color:#111;'> 1.60MB </span>","children":null,"spread":false}],"spread":true},{"title":"Mobile Security 1","children":[{"title":"73.pdf <span style='color:#111;'> 1.42MB </span>","children":null,"spread":false},{"title":"72.pdf <span style='color:#111;'> 2.01MB </span>","children":null,"spread":false},{"title":"71.pdf <span style='color:#111;'> 1.87MB </span>","children":null,"spread":false},{"title":"70.pdf <span style='color:#111;'> 21.60MB </span>","children":null,"spread":false}],"spread":true},{"title":"文件名与论文标题对应表.txt <span style='color:#111;'> 12.86KB </span>","children":null,"spread":false},{"title":"Secure Computation 1","children":[{"title":"44.pdf <span style='color:#111;'> 1.48MB </span>","children":null,"spread":false},{"title":"45.pdf <span style='color:#111;'> 2.54MB </span>","children":null,"spread":false}],"spread":true},{"title":"Secure Computation 2","children":[{"title":"55.pdf <span style='color:#111;'> 1.57MB </span>","children":null,"spread":false},{"title":"54.pdf <span style='color:#111;'> 1.39MB </span>","children":null,"spread":false},{"title":"57.pdf <span style='color:#111;'> 1.51MB </span>","children":null,"spread":false},{"title":"56.pdf <span style='color:#111;'> 2.49MB </span>","children":null,"spread":false}],"spread":true},{"title":"TLS","children":[{"title":"90.pdf <span style='color:#111;'> 1.39MB </span>","children":null,"spread":false},{"title":"89.pdf <span style='color:#111;'> 1.38MB </span>","children":null,"spread":false},{"title":"88.pdf <span style='color:#111;'> 1.33MB </span>","children":null,"spread":false}],"spread":true},{"title":"Web Security 2","children":[{"title":"106.pdf <span style='color:#111;'> 1.27MB </span>","children":null,"spread":false},{"title":"108.pdf <span style='color:#111;'> 1.51MB </span>","children":null,"spread":false},{"title":"109.pdf <span style='color:#111;'> 1.90MB </span>","children":null,"spread":false},{"title":"107.pdf <span style='color:#111;'> 1.21MB </span>","children":null,"spread":false}],"spread":true},{"title":"SDN 1","children":[{"title":"2.pdf <span style='color:#111;'> 1.31MB </span>","children":null,"spread":false},{"title":"1.pdf <span style='color:#111;'> 3.28MB </span>","children":null,"spread":false}],"spread":true},{"title":"IoT Security","children":[{"title":"69.pdf <span style='color:#111;'> 1.37MB </span>","children":null,"spread":false},{"title":"66.pdf <span style='color:#111;'> 1.67MB </span>","children":null,"spread":false},{"title":"67.pdf <span style='color:#111;'> 3.86MB </span>","children":null,"spread":false},{"title":"68.pdf <span style='color:#111;'> 12.01MB </span>","children":null,"spread":false}],"spread":false},{"title":"ZKPs and Lattices","children":[{"title":"33.pdf <span style='color:#111;'> 1.42MB </span>","children":null,"spread":false},{"title":"35.pdf <span style='color:#111;'> 1.37MB </span>","children":null,"spread":false},{"title":"36.pdf <span style='color:#111;'> 1.51MB </span>","children":null,"spread":false},{"title":"34.pdf <span style='color:#111;'> 1.98MB </span>","children":null,"spread":false}],"spread":false},{"title":"Usable Security","children":[{"title":"81.pdf <span style='color:#111;'> 993.52KB </span>","children":null,"spread":false},{"title":"80.pdf <span style='color:#111;'> 2.11MB </span>","children":null,"spread":false},{"title":"79.pdf <span style='color:#111;'> 6.46MB </span>","children":null,"spread":false},{"title":"78.pdf <span style='color:#111;'> 1.79MB </span>","children":null,"spread":false}],"spread":false},{"title":"Side Channels","children":[{"title":"10.pdf <span style='color:#111;'> 5.01MB </span>","children":null,"spread":false},{"title":"11.pdf <span style='color:#111;'> 4.41MB </span>","children":null,"spread":false},{"title":"12.pdf <span style='color:#111;'> 1.88MB </span>","children":null,"spread":false},{"title":"9.pdf <span style='color:#111;'> 2.75MB </span>","children":null,"spread":false}],"spread":false},{"title":"0.pdf <span style='color:#111;'> 584.18KB </span>","children":null,"spread":false},{"title":"Usable Passwords","children":[{"title":"98.pdf <span style='color:#111;'> 7.69MB </span>","children":null,"spread":false},{"title":"99.pdf <span style='color:#111;'> 2.16MB </span>","children":null,"spread":false},{"title":"97.pdf <span style='color:#111;'> 1.51MB </span>","children":null,"spread":false}],"spread":false},{"title":"SDN 2","children":[{"title":"43.pdf <span style='color:#111;'> 2.36MB </span>","children":null,"spread":false},{"title":"42.pdf <span style='color:#111;'> 2.07MB </span>","children":null,"spread":false}],"spread":false},{"title":"Smart Contracts","children":[{"title":"5.pdf <span style='color:#111;'> 2.06MB </span>","children":null,"spread":false},{"title":"6.pdf <span style='color:#111;'> 1.47MB </span>","children":null,"spread":false}],"spread":false},{"title":"Privacy","children":[{"title":"4.pdf <span style='color:#111;'> 1.41MB </span>","children":null,"spread":false},{"title":"3.pdf <span style='color:#111;'> 1.56MB </span>","children":null,"spread":false}],"spread":false},{"title":"Protocols","children":[{"title":"128.pdf <span style='color:#111;'> 1.32MB </span>","children":null,"spread":false},{"title":"126.pdf <span style='color:#111;'> 1.59MB </span>","children":null,"spread":false},{"title":"129.pdf <span style='color:#111;'> 1.58MB </span>","children":null,"spread":false},{"title":"127.pdf <span style='color:#111;'> 2.56MB </span>","children":null,"spread":false}],"spread":false},{"title":"ML 2","children":[{"title":"38.pdf <span style='color:#111;'> 2.42MB </span>","children":null,"spread":false},{"title":"40.pdf <span style='color:#111;'> 1.51MB </span>","children":null,"spread":false},{"title":"41.pdf <span style='color:#111;'> 883.46KB </span>","children":null,"spread":false},{"title":"37.pdf <span style='color:#111;'> 2.29MB </span>","children":null,"spread":false},{"title":"39.pdf <span style='color:#111;'> 1.57MB </span>","children":null,"spread":false}],"spread":false}],"spread":true}]

评论信息

  • u010467030 :
    找了好久,不容易。
    2019-07-03
  • u010467030 :
    找了好久,不容易。
    2019-07-03

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明