Session details: Security
Abstract
No abstract available.
Recommendations
Session details: Session 8A: Security II
ASPLOS '16: Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating SystemsSession details: Session 5: IoT Security
CODASPY '22: Proceedings of the Twelfth ACM Conference on Data and Application Security and PrivacySession details: Session 6A: IoT Security
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
April 2009
2426 pages
ISBN:9781605582467
DOI:10.1145/1518701
- General Chairs:
- Dan R. Olsen,
- Richard B. Arthur,
- Program Chairs:
- Ken Hinckley,
- Meredith Ringel Morris,
- Scott Hudson,
- Saul Greenberg
Copyright © 2009 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 04 April 2009
Check for updates
Qualifiers
- Section
Conference
Acceptance Rates
CHI '09 Paper Acceptance Rate 277 of 1,130 submissions, 25%;
Overall Acceptance Rate 6,199 of 26,314 submissions, 24%
Upcoming Conference
CHI 2025
- Sponsor:
- sigchi
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 11 Dec 2024
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in