Top-Cited Security Papers

This webpage is an attempt to assemble a ranking of top-cited papers from the area of computer security. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Absolute citations are not necessarily a good indicator for the impact of a paper, as the number of citations usually grows with the age of a paper. The following list shows an alternative ranking, where the citations are normalized by the age of each paper.

Top 100 papers normalized by age ⌄

  1. 1
    Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
    Attribute-based encryption for fine-grained access control of encrypted data.
    ACM Conference on Computer and Communications Security (CCS), 2006
    3653 cites at Google Scholar
    2815% above average of year
    Last visited: Nov-2017
  2. 2
    Mihir Bellare, Phillip Rogaway:
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1993
    4621 cites at Google Scholar
    2766% above average of year
    Last visited: Dec-2017
  3. 3
    D. F. C. Brewer, Michael J. Nash:
    The Chinese Wall Security Policy.
    IEEE Symposium on Security and Privacy, 1989
    1290 cites at Google Scholar
    2602% above average of year
    Last visited: Nov-2017
  4. 4
    Steven M. Bellovin, Michael Merritt:
    Encrypted key exchange: password-based protocols secure against dictionary attacks.
    IEEE Symposium on Security and Privacy, 1992
    1717 cites at Google Scholar
    2082% above average of year
    Last visited: Dec-2017
  5. 5
    Nicholas Carlini, David A. Wagner:
    Towards Evaluating the Robustness of Neural Networks.
    IEEE Symposium on Security and Privacy, 2017
    84 cites at Google Scholar
    1997% above average of year
    Last visited: Nov-2017
  6. 6
    John Bethencourt, Amit Sahai, Brent Waters:
    Ciphertext-Policy Attribute-Based Encryption.
    IEEE Symposium on Security and Privacy, 2007
    3144 cites at Google Scholar
    1980% above average of year
    Last visited: Nov-2017
  7. 7
    Matt Blaze, Joan Feigenbaum, Jack Lacy:
    Decentralized Trust Management.
    IEEE Symposium on Security and Privacy, 1996
    2924 cites at Google Scholar
    1926% above average of year
    Last visited: Nov-2017
  8. 8
    Yajin Zhou, Xuxian Jiang:
    Dissecting Android Malware: Characterization and Evolution.
    IEEE Symposium on Security and Privacy, 2012
    1441 cites at Google Scholar
    1854% above average of year
    Last visited: Nov-2017
  9. 9
    Laurent Eschenauer, Virgil D. Gligor:
    A key-management scheme for distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    4591 cites at Google Scholar
    1853% above average of year
    Last visited: Nov-2017
  10. 10
    Dorothy E. Denning:
    An Intrusion-Detection Model.
    IEEE Symposium on Security and Privacy, 1986
    4376 cites at Google Scholar
    1701% above average of year
    Last visited: Aug-2017
  11. 11
    Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
    Random Key Predistribution Schemes for Sensor Networks.
    IEEE Symposium on Security and Privacy, 2003
    3696 cites at Google Scholar
    1541% above average of year
    Last visited: Nov-2017
  12. 12
    Dawn Xiaodong Song, David Wagner, Adrian Perrig:
    Practical Techniques for Searches on Encrypted Data.
    IEEE Symposium on Security and Privacy, 2000
    2260 cites at Google Scholar
    1513% above average of year
    Last visited: Nov-2017
  13. 13
    Martín Abadi, Andrew D. Gordon:
    A Calculus for Cryptographic Protocols: The Spi Calculus.
    ACM Conference on Computer and Communications Security (CCS), 1997
    1895 cites at Google Scholar
    1500% above average of year
    Last visited: Nov-2017
  14. 14
    Thomas Beth, Malte Borcherding, Birgit Klein:
    Valuation of Trust in Open Networks.
    European Symposium on Research in Computer Security (ESORICS), 1994
    1132 cites at Google Scholar
    1486% above average of year
    Last visited: Sep-2017
  15. 15
    Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
    Provable data possession at untrusted stores.
    ACM Conference on Computer and Communications Security (CCS), 2007
    2292 cites at Google Scholar
    1416% above average of year
    Last visited: Sep-2017
  16. 16
    Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
    Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1797 cites at Google Scholar
    1400% above average of year
    Last visited: Oct-2017
  17. 17
    Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner:
    Android permissions demystified.
    ACM Conference on Computer and Communications Security (CCS), 2011
    1206 cites at Google Scholar
    1354% above average of year
    Last visited: Nov-2017
  18. 18
    Joseph A. Goguen, José Meseguer:
    Security Policies and Security Models.
    IEEE Symposium on Security and Privacy, 1982
    2249 cites at Google Scholar
    1222% above average of year
    Last visited: Nov-2017
  19. 19
    Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck:
    DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.
    Network and Distributed System Security Symposium (NDSS), 2014
    481 cites at Google Scholar
    1200% above average of year
    Last visited: Nov-2017
  20. 20
    Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou:
    Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.
    IEEE Symposium on Security and Privacy, 2016
    159 cites at Google Scholar
    1190% above average of year
    Last visited: Dec-2017
  21. 21
    Martín Abadi, Roger M. Needham:
    Prudent engineering practice for cryptographic protocols.
    IEEE Symposium on Security and Privacy, 1994
    895 cites at Google Scholar
    1154% above average of year
    Last visited: Nov-2017
  22. 22
    D. D. Clark, D. R. Wilson:
    A Comparison of Commercial and Military Computer Security Policies.
    IEEE Symposium on Security and Privacy, 1987
    1721 cites at Google Scholar
    1152% above average of year
    Last visited: Dec-2017
  23. 23
    Li Gong, Roger M. Needham, Raphael Yahalom:
    Reasoning about Belief in Cryptographic Protocols.
    IEEE Symposium on Security and Privacy, 1990
    833 cites at Google Scholar
    1110% above average of year
    Last visited: Nov-2017
  24. 24
    Arvind Narayanan, Vitaly Shmatikov:
    Robust De-anonymization of Large Sparse Datasets.
    IEEE Symposium on Security and Privacy, 2008
    1331 cites at Google Scholar
    1109% above average of year
    Last visited: Dec-2017
  25. 25
    Roger M. Needham:
    Denial of Service.
    ACM Conference on Computer and Communications Security (CCS), 1993
    1925 cites at Google Scholar
    1094% above average of year
    Last visited: Nov-2017
  26. 26
    Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke:
    A Security Architecture for Computational Grids.
    ACM Conference on Computer and Communications Security (CCS), 1998
    1871 cites at Google Scholar
    1072% above average of year
    Last visited: Dec-2017
  27. 27
    Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe:
    Post-quantum Key Exchange - A New Hope.
    USENIX Security Symposium, 2016
    142 cites at Google Scholar
    1052% above average of year
    Last visited: Dec-2017
  28. 28
    Ari Juels, Burton S. Kaliski Jr.:
    Pors: proofs of retrievability for large files.
    ACM Conference on Computer and Communications Security (CCS), 2007
    1730 cites at Google Scholar
    1045% above average of year
    Last visited: Dec-2017
  29. 29
    William Enck, Damien Octeau, Patrick McDaniel, Swarat Chaudhuri:
    A Study of Android Application Security.
    USENIX Security Symposium, 2011
    923 cites at Google Scholar
    1012% above average of year
    Last visited: Nov-2017
  30. 30
    Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
    Searchable symmetric encryption: improved definitions and efficient constructions.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1372 cites at Google Scholar
    995% above average of year
    Last visited: Oct-2017
  31. 31
    Wenke Lee, Salvatore J. Stolfo:
    Data Mining Approaches for Intrusion Detection.
    USENIX Security Symposium, 1998
    1689 cites at Google Scholar
    958% above average of year
    Last visited: Oct-2017
  32. 32
    Jeffrey O. Kephart, Steve R. White:
    Directed-Graph Epidemiological Models of Computer Viruses.
    IEEE Symposium on Security and Privacy, 1991
    893 cites at Google Scholar
    956% above average of year
    Last visited: Dec-2017
  33. 33
    Crispan Cowan:
    StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
    USENIX Security Symposium, 1998
    1684 cites at Google Scholar
    955% above average of year
    Last visited: Dec-2017
  34. 34
    Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami:
    The Limitations of Deep Learning in Adversarial Settings.
    IEEE European Symposium on Security and Privacy, 2016
    127 cites at Google Scholar
    931% above average of year
    Last visited: Sep-2017
  35. 35
    Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
    Experimental Security Analysis of a Modern Automobile.
    IEEE Symposium on Security and Privacy, 2010
    834 cites at Google Scholar
    912% above average of year
    Last visited: Nov-2017
  36. 36
    Yao Liu, Michael K. Reiter, Peng Ning:
    False data injection attacks against state estimation in electric power grids.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1207 cites at Google Scholar
    907% above average of year
    Last visited: Dec-2017
  37. 37
    James Newsome, Dawn Xiaodong Song:
    Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
    Network and Distributed System Security Symposium (NDSS), 2005
    1480 cites at Google Scholar
    903% above average of year
    Last visited: Sep-2017
  38. 38
    Donggang Liu, Peng Ning:
    Establishing pairwise keys in distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2259 cites at Google Scholar
    903% above average of year
    Last visited: Nov-2017
  39. 39
    Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
    LEAP: efficient security mechanisms for large-scale distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2215 cites at Google Scholar
    884% above average of year
    Last visited: Nov-2017
  40. 40
    Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
    A Data Mining Framework for Building Intrusion Detection Models.
    IEEE Symposium on Security and Privacy, 1999
    1630 cites at Google Scholar
    878% above average of year
    Last visited: Nov-2017
  41. 41
    Gene H. Kim, Eugene H. Spafford:
    The Design and Implementation of Tripwire: A File System Integrity Checker.
    ACM Conference on Computer and Communications Security (CCS), 1994
    692 cites at Google Scholar
    869% above average of year
    Last visited: Oct-2017
  42. 42
    Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang:
    Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.
    Network and Distributed System Security Symposium (NDSS), 2012
    707 cites at Google Scholar
    859% above average of year
    Last visited: Nov-2017
  43. 43
    David Moore, Geoffrey M. Voelker, Stefan Savage:
    Inferring Internet Denial-of-Service Activity.
    USENIX Security Symposium, 2001
    1798 cites at Google Scholar
    858% above average of year
    Last visited: Oct-2017
  44. 44
    J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
    Lest We Remember: Cold Boot Attacks on Encryption Keys.
    USENIX Security Symposium, 2008
    1046 cites at Google Scholar
    850% above average of year
    Last visited: Nov-2017
  45. 45
    Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
    USENIX Security Symposium, 2008
    1027 cites at Google Scholar
    832% above average of year
    Last visited: Dec-2017
  46. 46
    Joseph A. Goguen, José Meseguer:
    Unwinding and Inference Control.
    IEEE Symposium on Security and Privacy, 1984
    472 cites at Google Scholar
    825% above average of year
    Last visited: Nov-2017
  47. 47
    Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
    The Omega Key Management Service.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1334 cites at Google Scholar
    824% above average of year
    Last visited: Sep-2016
  48. 48
    Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
    Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
    European Symposium on Research in Computer Security (ESORICS), 2009
    1091 cites at Google Scholar
    811% above average of year
    Last visited: Nov-2017
  49. 49
    Kevin D. Bowers, Ari Juels, Alina Oprea:
    HAIL: a high-availability and integrity layer for cloud storage.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1067 cites at Google Scholar
    790% above average of year
    Last visited: Dec-2017
  50. 50
    Ari Juels, Martin Wattenberg:
    A Fuzzy Commitment Scheme.
    ACM Conference on Computer and Communications Security (CCS), 1999
    1475 cites at Google Scholar
    785% above average of year
    Last visited: Nov-2017
  51. 51
    Nicolas Papernot, Patrick Drew McDaniel, Xi Wu, Somesh Jha, Ananthram Swami:
    Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks.
    IEEE Symposium on Security and Privacy, 2016
    107 cites at Google Scholar
    768% above average of year
    Last visited: Oct-2017
  52. 52
    C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
    Dynamic provable data possession.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1026 cites at Google Scholar
    756% above average of year
    Last visited: Nov-2017
  53. 53
    Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
    Network and Distributed System Security Symposium (NDSS), 2005
    1258 cites at Google Scholar
    753% above average of year
    Last visited: Dec-2017
  54. 54
    Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter:
    Detecting Intrusions using System Calls: Alternative Data Models.
    IEEE Symposium on Security and Privacy, 1999
    1419 cites at Google Scholar
    752% above average of year
    Last visited: Oct-2017
  55. 55
    Hervé Debar, Monique Becker, Didier Siboni:
    A neural network component for an intrusion detection system.
    IEEE Symposium on Security and Privacy, 1992
    667 cites at Google Scholar
    748% above average of year
    Last visited: Nov-2017
  56. 56
    Patrice Godefroid, Michael Y. Levin, David A. Molnar:
    Automated Whitebox Fuzz Testing.
    Network and Distributed System Security Symposium (NDSS), 2008
    929 cites at Google Scholar
    743% above average of year
    Last visited: Oct-2017
  57. 57
    Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
    IEEE Symposium on Security and Privacy, 2000
    1165 cites at Google Scholar
    731% above average of year
    Last visited: Dec-2017
  58. 58
    Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
    EXE: automatically generating inputs of death.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1003 cites at Google Scholar
    700% above average of year
    Last visited: Oct-2017
  59. 59
    Reza Shokri, Marco Stronati, Congzheng Song, Vitaly Shmatikov:
    Membership Inference Attacks Against Machine Learning Models.
    IEEE Symposium on Security and Privacy, 2017
    32 cites at Google Scholar
    699% above average of year
    Last visited: Nov-2017
  60. 60
    L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, David Wolber:
    A Network Security Monitor.
    IEEE Symposium on Security and Privacy, 1990
    545 cites at Google Scholar
    692% above average of year
    Last visited: Dec-2017
  61. 61
    Arvind Narayanan, Vitaly Shmatikov:
    De-anonymizing Social Networks.
    IEEE Symposium on Security and Privacy, 2009
    940 cites at Google Scholar
    684% above average of year
    Last visited: Sep-2017
  62. 62
    Guofei Gu, Junjie Zhang, Wenke Lee:
    BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
    Network and Distributed System Security Symposium (NDSS), 2008
    864 cites at Google Scholar
    684% above average of year
    Last visited: Dec-2017
  63. 63
    John McLean:
    Security Models and Information Flow.
    IEEE Symposium on Security and Privacy, 1990
    531 cites at Google Scholar
    671% above average of year
    Last visited: Dec-2017
  64. 64
    Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
    Comprehensive Experimental Analyses of Automotive Attack Surfaces.
    USENIX Security Symposium, 2011
    639 cites at Google Scholar
    670% above average of year
    Last visited: Oct-2017
  65. 65
    Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
    Proxy Signatures for Delegating Signing Operation.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1107 cites at Google Scholar
    667% above average of year
    Last visited: Dec-2017
  66. 66
    William Enck, Machigar Ongtang, Patrick Drew McDaniel:
    On lightweight mobile phone application certification.
    ACM Conference on Computer and Communications Security (CCS), 2009
    919 cites at Google Scholar
    667% above average of year
    Last visited: Dec-2017
  67. 67
    Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, Ruby B. Lee:
    Last-Level Cache Side-Channel Attacks are Practical.
    IEEE Symposium on Security and Privacy, 2015
    189 cites at Google Scholar
    658% above average of year
    Last visited: Dec-2017
  68. 68
    Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
    SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
    IEEE Symposium on Security and Privacy, 2015
    189 cites at Google Scholar
    658% above average of year
    Last visited: Oct-2017
  69. 69
    Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn:
    Design and Implementation of a TCG-based Integrity Measurement Architecture.
    USENIX Security Symposium, 2004
    1258 cites at Google Scholar
    631% above average of year
    Last visited: Nov-2017
  70. 70
    Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim:
    Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates.
    ACM Conference on Computer and Communications Security (CCS), 2017
    29 cites at Google Scholar
    624% above average of year
    Last visited: Dec-2017
  71. 71
    Sriram Keelveedhi, Mihir Bellare, Thomas Ristenpart:
    DupLESS: Server-Aided Encryption for Deduplicated Storage.
    USENIX Security Symposium, 2013
    388 cites at Google Scholar
    623% above average of year
    Last visited: Dec-2017
  72. 72
    Robin Sommer, Vern Paxson:
    Outside the Closed World: On Using Machine Learning for Network Intrusion Detection.
    IEEE Symposium on Security and Privacy, 2010
    584 cites at Google Scholar
    608% above average of year
    Last visited: Nov-2017
  73. 73
    Yuval Yarom, Katrina Falkner:
    FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack.
    USENIX Security Symposium, 2014
    261 cites at Google Scholar
    606% above average of year
    Last visited: Dec-2017
  74. 74
    Tal Garfinkel, Mendel Rosenblum:
    A Virtual Machine Introspection Based Architecture for Intrusion Detection.
    Network and Distributed System Security Symposium (NDSS), 2003
    1553 cites at Google Scholar
    590% above average of year
    Last visited: Oct-2017
  75. 75
    Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich:
    VC3: Trustworthy Data Analytics in the Cloud Using SGX.
    IEEE Symposium on Security and Privacy, 2015
    169 cites at Google Scholar
    578% above average of year
    Last visited: Dec-2017
  76. 76
    Rachna Dhamija, Adrian Perrig:
    Deja Vu-A User Study: Using Images for Authentication.
    USENIX Security Symposium, 2000
    946 cites at Google Scholar
    575% above average of year
    Last visited: Aug-2017
  77. 77
    Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:
    IoT Goes Nuclear: Creating a ZigBee Chain Reaction.
    IEEE Symposium on Security and Privacy, 2017
    27 cites at Google Scholar
    574% above average of year
    Last visited: Nov-2017
  78. 78
    Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza:
    Zerocash: Decentralized Anonymous Payments from Bitcoin.
    IEEE Symposium on Security and Privacy, 2014
    249 cites at Google Scholar
    573% above average of year
    Last visited: Nov-2017
  79. 79
    Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang:
    Deep Learning with Differential Privacy.
    ACM Conference on Computer and Communications Security (CCS), 2016
    82 cites at Google Scholar
    566% above average of year
    Last visited: Oct-2017
  80. 80
    Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
    Cross-VM side channels and their use to extract private keys.
    ACM Conference on Computer and Communications Security (CCS), 2012
    490 cites at Google Scholar
    565% above average of year
    Last visited: Dec-2017
  81. 81
    Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
    Path ORAM: an extremely simple oblivious RAM protocol.
    ACM Conference on Computer and Communications Security (CCS), 2013
    356 cites at Google Scholar
    564% above average of year
    Last visited: Oct-2017
  82. 82
    Stuart Staniford, Vern Paxson, Nicholas Weaver:
    How to Own the Internet in Your Spare Time.
    USENIX Security Symposium, 2002
    1554 cites at Google Scholar
    561% above average of year
    Last visited: Nov-2017
  83. 83
    Michael Steiner, Gene Tsudik, Michael Waidner:
    Diffie-Hellman Key Distribution Extended to Group Communication.
    ACM Conference on Computer and Communications Security (CCS), 1996
    952 cites at Google Scholar
    560% above average of year
    Last visited: Nov-2017
  84. 84
    Lok-Kwong Yan, Heng Yin:
    DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis.
    USENIX Security Symposium, 2012
    480 cites at Google Scholar
    551% above average of year
    Last visited: Oct-2017
  85. 85
    Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Guofei Gu, Mabry Tyson:
    FRESCO: Modular Composable Security Services for Software-Defined Networks.
    Network and Distributed System Security Symposium (NDSS), 2013
    348 cites at Google Scholar
    549% above average of year
    Last visited: Nov-2017
  86. 86
    Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano:
    The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
    IEEE Symposium on Security and Privacy, 2012
    472 cites at Google Scholar
    540% above average of year
    Last visited: Oct-2017
  87. 87
    David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken:
    A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
    Network and Distributed System Security Symposium (NDSS), 2000
    893 cites at Google Scholar
    537% above average of year
    Last visited: Nov-2017
  88. 88
    Neal R. Wagner:
    Fingerprinting.
    IEEE Symposium on Security and Privacy, 1983
    260 cites at Google Scholar
    535% above average of year
    Last visited: Dec-2017
  89. 89
    William A. Arbaugh, David J. Farber, Jonathan M. Smith:
    A Secure and Reliable Bootstrap Architecture.
    IEEE Symposium on Security and Privacy, 1997
    749 cites at Google Scholar
    533% above average of year
    Last visited: Dec-2017
  90. 90
    James Newsome, Brad Karp, Dawn Xiaodong Song:
    Polygraph: Automatically Generating Signatures for Polymorphic Worms.
    IEEE Symposium on Security and Privacy, 2005
    932 cites at Google Scholar
    532% above average of year
    Last visited: Dec-2017
  91. 91
    Mark W. Eichin, Jon A. Rochlis:
    With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988.
    IEEE Symposium on Security and Privacy, 1989
    301 cites at Google Scholar
    531% above average of year
    Last visited: Oct-2017
  92. 92
    Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna:
    Detecting spammers on social networks.
    Annual Computer Security Applications Conference (ACSAC), 2010
    517 cites at Google Scholar
    527% above average of year
    Last visited: Dec-2017
  93. 93
    Matthew K. Franklin, Michael K. Reiter:
    The design and implementation of a secure auction service.
    IEEE Symposium on Security and Privacy, 1995
    446 cites at Google Scholar
    527% above average of year
    Last visited: Dec-2017
  94. 94
    Paul F. Syverson, Paul C. van Oorschot:
    On unifying some cryptographic protocol logics.
    IEEE Symposium on Security and Privacy, 1994
    445 cites at Google Scholar
    523% above average of year
    Last visited: Dec-2017
  95. 95
    Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang:
    CHEX: statically vetting Android apps for component hijacking vulnerabilities.
    ACM Conference on Computer and Communications Security (CCS), 2012
    451 cites at Google Scholar
    512% above average of year
    Last visited: Nov-2017
  96. 96
    Rafail Ostrovsky, Amit Sahai, Brent Waters:
    Attribute-based encryption with non-monotonic access structures.
    ACM Conference on Computer and Communications Security (CCS), 2007
    922 cites at Google Scholar
    510% above average of year
    Last visited: Dec-2017
  97. 97
    Steven Englehardt, Arvind Narayanan:
    Online Tracking: A 1-million-site Measurement and Analysis.
    ACM Conference on Computer and Communications Security (CCS), 2016
    75 cites at Google Scholar
    509% above average of year
    Last visited: Dec-2017
  98. 98
    Hovav Shacham:
    The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
    ACM Conference on Computer and Communications Security (CCS), 2007
    919 cites at Google Scholar
    508% above average of year
    Last visited: Dec-2017
  99. 99
    Guojun Wang, Qin Liu, Jie Wu:
    Hierarchical attribute-based encryption for fine-grained access control in cloud storage services.
    ACM Conference on Computer and Communications Security (CCS), 2010
    497 cites at Google Scholar
    503% above average of year
    Last visited: Nov-2017
  100. 100
    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
    Control-flow integrity.
    ACM Conference on Computer and Communications Security (CCS), 2005
    886 cites at Google Scholar
    501% above average of year
    Last visited: Dec-2017