USENIX Security 2020 论文集

上传者: qyehd78434979 | 上传时间: 2021-01-18 11:48:16 | 文件大小: 288.77MB | 文件类型: ZIP
USENIX Security '20 论文集,共29个session,每个session处理为一个pdf,并为其中每篇论文添加了标签,欢迎下载

文件下载

资源详情

[{"title":"( 30 个子文件 288.77MB ) USENIX Security 2020 论文集","children":[{"title":"USENIX -2020-Papers","children":[{"title":"Session #21 - Side Channel Attacks.pdf <span style='color:#111;'> 9.42MB </span>","children":null,"spread":false},{"title":"Session #6 - Trusted Execution Environments 1.pdf <span style='color:#111;'> 5.81MB </span>","children":null,"spread":false},{"title":"Session #29 - Blockchains.pdf <span style='color:#111;'> 8.77MB </span>","children":null,"spread":false},{"title":"Session #16 - Financial Tech and Voting.pdf <span style='color:#111;'> 19.24MB </span>","children":null,"spread":false},{"title":"Session #4 - Mobile 1.pdf <span style='color:#111;'> 8.69MB </span>","children":null,"spread":false},{"title":"Session #7 - Network Security.pdf <span style='color:#111;'> 10.77MB </span>","children":null,"spread":false},{"title":"Session #22 - Implementations of Crypto.pdf <span style='color:#111;'> 3.79MB </span>","children":null,"spread":false},{"title":"Session #25 - Mobile 2 and Malware.pdf <span style='color:#111;'> 5.85MB </span>","children":null,"spread":false},{"title":"Session #26 - Data SecuritySecure Computation.pdf <span style='color:#111;'> 6.24MB </span>","children":null,"spread":false},{"title":"Session #2 - Human Factors.pdf <span style='color:#111;'> 13.85MB </span>","children":null,"spread":false},{"title":"Session #11 - Privacy Enhancing Technologies.pdf <span style='color:#111;'> 9.44MB </span>","children":null,"spread":false},{"title":"Session #27 - Fuzzing 2.pdf <span style='color:#111;'> 14.14MB </span>","children":null,"spread":false},{"title":"Session #28 - Voice and Speech.pdf <span style='color:#111;'> 19.68MB </span>","children":null,"spread":false},{"title":"Session #17 - Machine Learning 2.pdf <span style='color:#111;'> 9.28MB </span>","children":null,"spread":false},{"title":"Session #18 - Systems Security.pdf <span style='color:#111;'> 5.11MB </span>","children":null,"spread":false},{"title":"Session #13 - Embedded IoT Security.pdf <span style='color:#111;'> 46.50MB </span>","children":null,"spread":false},{"title":"Session #12 - Software Security.pdf <span style='color:#111;'> 6.27MB </span>","children":null,"spread":false},{"title":"Session #24 - Fuzzing 1.pdf <span style='color:#111;'> 8.46MB </span>","children":null,"spread":false},{"title":"Session #5 - Phishing, Spam, and Threat Intelligence.pdf <span style='color:#111;'> 12.17MB </span>","children":null,"spread":false},{"title":"Session #14 - Machine Learning 1.pdf <span style='color:#111;'> 28.64MB </span>","children":null,"spread":false},{"title":"Session #15 - Microarchitectural Attacks.pdf <span style='color:#111;'> 4.83MB </span>","children":null,"spread":false},{"title":"Session #10 -Automotive and Drone Security.pdf <span style='color:#111;'> 23.98MB </span>","children":null,"spread":false},{"title":"USENIX Security ‘20 _contents.pdf <span style='color:#111;'> 249.93KB </span>","children":null,"spread":false},{"title":"Session #23 - Authentication.pdf <span style='color:#111;'> 4.94MB </span>","children":null,"spread":false},{"title":"Session #1 - Wireless Security.pdf <span style='color:#111;'> 5.28MB </span>","children":null,"spread":false},{"title":"Session #8 - Web Security and Privacy.pdf <span style='color:#111;'> 10.22MB </span>","children":null,"spread":false},{"title":"Session #20 - Specific User Populations.pdf <span style='color:#111;'> 3.71MB </span>","children":null,"spread":false},{"title":"Session #9 - Trusted Execution Environments 2.pdf <span style='color:#111;'> 7.04MB </span>","children":null,"spread":false},{"title":"Session #3 - Software Security and Verification.pdf <span style='color:#111;'> 4.62MB </span>","children":null,"spread":false},{"title":"Session #19 - Analysis of Crypto.pdf <span style='color:#111;'> 5.95MB </span>","children":null,"spread":false}],"spread":false}],"spread":true}]

评论信息

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明