Personensuche
X
?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy ,
1
Leveraging Generative Models for Covert Messaging: Challeng..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
2
Compact Frequency Estimators in Adversarial Environments:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
3
SMS OTP Security (SOS) : Hardening SMS-Based Two Factor ..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
4
Hardening Circuit-Design IP Against Reverse-Engineering Att..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
5
Security Foundations for Application-Based Covert Communica..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
6
Hear "No Evil", See "Kenansville": Efficient and Transferab..:
, In:
?
Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science ,
7
Quantifying the Security Cost of Migrating Protocols to Pra..:
, In:
?
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security ,
8
A Hybrid Approach to Secure Function Evaluation using SGX:
, In:
?
Advances in Cryptology – CRYPTO 2019; Lecture Notes in Computer Science ,
9
Security in the Presence of Key Reuse: Context-Separable In..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
10
Probabilistic Data Structures in Adversarial Environments:
, In:
?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ,
11
Mitigating Risk while Complying with Data Retention Laws:
, In:
?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ,
12
Partially Specified Channels : The TLS 1.3 Record Layer ..:
, In:
?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security ,
13
Standardizing Bad Cryptographic Practice : A Teardown of..:
, In:
?
2015 European Conference on Optical Communication (ECOC) ,
14
Combined structural and optical modelling tool to optimise ..:
, In:
?
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security ,
15