32 results on '"Gene Tsudik"'
Search Results
2. PsfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants.
3. Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols.
4. ProvCam: A Camera Module with Self-Contained TCB for Producing Verifiable Videos.
5. Acoustic Side-Channel Attacks on a Computer Mouse.
6. Toward Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices.
7. The SA4P Framework: Sensing and Actuation as a Privilege.
8. $\mathcal{P}\text{ARseL}$: Towards a Verified Root-of-Trust Over seL4.
9. An Empirical Study & Evaluation of Modern CAPTCHAs.
10. Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence.
11. Staving off the IoT Armageddon.
12. Poster: Control-Flow Integrity in Low-end Embedded Devices.
13. Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
14. Balancing Security and Privacy in Genomic Range Queries.
15. CASU: Compromise Avoidance via Secure Update for Low-End Embedded Systems.
16. V'CER: Efficient Certificate Validation in Constrained Networks.
17. GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices).
18. SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier.
19. Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA.
20. Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection.
21. Vronicle: verifiable provenance for videos from mobile devices.
22. We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads.
23. SEDIMENT: An IoT-device-centric Methodology for Scalable 5G Network Security.
24. VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests.
25. PARseL: Towards a Verified Root-of-Trust over seL4.
26. Dazed & Confused: A Large-Scale Real-World User Study of reCAPTCHAv2.
27. Puppy: A Publicly Verifiable Watermarking Protocol.
28. Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input.
29. BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication.
30. Computer Security – ESORICS 2023 : 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part IV
31. Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I
32. Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.