Search

Your search keyword '"Butler, Kevin"' showing total 15 results

Search Constraints

Start Over You searched for: Author "Butler, Kevin" Remove constraint Author: "Butler, Kevin" Topic computer science - cryptography and security Remove constraint Topic: computer science - cryptography and security
15 results on '"Butler, Kevin"'

Search Results

1. Every Breath You Don't Take: Deepfake Speech Detection Using Breath

2. AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management

3. Privacy-Preserving Gaze Data Streaming in Immersive Interactive Virtual Reality: Robustness and User Experience

4. Eye-tracked Virtual Reality: A Comprehensive Survey on Methods and Privacy Challenges

5. Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses

6. A Practical Methodology for ML-Based EM Side Channel Disassemblers

7. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android

8. One-Time Programs made Practical

9. A Hybrid Approach to Secure Function Evaluation Using SGX

10. Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

11. Explainable Black-Box Attacks Against Model-based Authentication

12. FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution

13. Retrofitting Applications with Provenance-Based Security Monitoring

14. Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values

15. LTRACK: Stealthy Tracking of Mobile Phones in LTE

Catalog

Books, media, physical & digital resources