8 results on '"Butler, Kevin"'
Search Results
2. Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation
3. Outsourcing Secure Two-Party Computation as a Black Box
4. More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations
5. Memory-Efficient Garbled Circuit Generation for Mobile Devices
6. Privacy Preserving Web-Based Email
7. Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior
8. Towards Automated Privilege Separation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.