Rights statement: © ACM, 2015. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security http://dx.doi.org/10.1145/2810103.2813727
Accepted author manuscript, 461 KB, PDF document
Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License
Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Publication date | 12/10/2015 |
---|---|
Host publication | CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security |
Place of Publication | New York |
Publisher | ACM |
Pages | 352-363 |
Number of pages | 12 |
ISBN (print) | 9781450338325 |
<mark>Original language</mark> | English |
Event | the 22nd ACM SIGSAC Conference on Computer and Communications Security - Denver, United States Duration: 6/10/2015 → 12/10/2015 |
Conference | the 22nd ACM SIGSAC Conference on Computer and Communications Security |
---|---|
Abbreviated title | CCS 2015 |
Country/Territory | United States |
City | Denver |
Period | 6/10/15 → 12/10/15 |
Conference | the 22nd ACM SIGSAC Conference on Computer and Communications Security |
---|---|
Abbreviated title | CCS 2015 |
Country/Territory | United States |
City | Denver |
Period | 6/10/15 → 12/10/15 |