Shrimpton, A. J.
23  Ergebnisse:
Personensuche X
?
1

Leveraging Generative Models for Covert Messaging: Challeng..:

, In: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy,
 
?
2

Compact Frequency Estimators in Adversarial Environments:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Markelon, Sam A. ; Filic, Mia ; Shrimpton, Thomas - p. 3254-3268 , 2023
 
?
3

SMS OTP Security (SOS) : Hardening SMS-Based Two Factor ..:

, In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security,
 
?
4

Hardening Circuit-Design IP Against Reverse-Engineering Att..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Chhotaray, Animesh ; Shrimpton, Thomas - p. 1672-1689 , 2022
 
?
5

Security Foundations for Application-Based Covert Communica..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
 
?
 
?
7

Quantifying the Security Cost of Migrating Protocols to Pra..:

, In: Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science,
Patton, Christopher ; Shrimpton, Thomas - p. 94-124 , 2020
 
?
8

A Hybrid Approach to Secure Function Evaluation using SGX:

, In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security,
 
?
9

Security in the Presence of Key Reuse: Context-Separable In..:

, In: Advances in Cryptology – CRYPTO 2019; Lecture Notes in Computer Science,
Patton, Christopher ; Shrimpton, Thomas - p. 738-768 , 2019
 
?
10

Probabilistic Data Structures in Adversarial Environments:

, In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
 
?
11

Mitigating Risk while Complying with Data Retention Laws:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
Vargas, Luis ; Hazarika, Gyan ; Culpepper, Rachel... - p. 2011-2027 , 2018
 
?
12

Partially Specified Channels : The TLS 1.3 Record Layer ..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
Patton, Christopher ; Shrimpton, Thomas - p. 1415-1428 , 2018
 
?
13

Standardizing Bad Cryptographic Practice : A Teardown of..:

, In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security,
Chhotaray, Animesh ; Nahiyan, Adib ; Shrimpton, Thomas.. - p. 1533-1546 , 2017
 
?
14

Combined structural and optical modelling tool to optimise ..:

, In: 2015 European Conference on Optical Communication (ECOC),
 
?
15

Seeing through Network-Protocol Obfuscation:

, In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,
Wang, Liang ; Dyer, Kevin P. ; Akella, Aditya.. - p. 57-69 , 2015
 
1-15