Search alternatives:
communications security » communication security (Expand Search), communications satellite (Expand Search)
sigsac conference » ais conference (Expand Search), iwa conference (Expand Search), soas conference (Expand Search)
2024 acm » 2024 a (Expand Search), 2024 art (Expand Search)
communications security » communication security (Expand Search), communications satellite (Expand Search)
sigsac conference » ais conference (Expand Search), iwa conference (Expand Search), soas conference (Expand Search)
2024 acm » 2024 a (Expand Search), 2024 art (Expand Search)
-
1
Formal Privacy Proof of Data Encoding: The Possibility and Impossibility of Learnable Encryption
Published 2025“…ACM|Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security…”
Get full text
Article -
2
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies
Published 2025“…ACM|Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security…”
Get full text
Article -
3
Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking
Published 2025“…ACM|Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security…”
Get full text
Article -
4
Specification and Verification of Strong Timing Isolation of Hardware Enclaves
Published 2025“…ACM|Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security…”
Get full text
Article -
5
Graphical vs. Deep Generative Models: Measuring the Impact of Differentially Private Mechanisms and Budgets on Utility
Published 2025“…ACM|Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security…”
Get full text
Article -
6
Manipulative Interference Attacks
Published 2025“…ACM|Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security…”
Get full text
Article -
7
Secure Sorting and Selection via Function Secret Sharing
Published 2025“…ACM|Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security…”
Get full text
Article