Search

Your search keyword '"Butler, Kevin R. B."' showing total 42 results

Search Constraints

Start Over You searched for: Author "Butler, Kevin R. B." Remove constraint Author: "Butler, Kevin R. B."
42 results on '"Butler, Kevin R. B."'

Search Results

1. AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management

2. A Practical Methodology for ML-Based EM Side Channel Disassemblers

3. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android

4. Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples

6. One-Time Programs made Practical

7. A Hybrid Approach to Secure Function Evaluation Using SGX

8. Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

9. Explainable Black-Box Attacks Against Model-based Authentication

10. FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution

12. One-Time Programs Made Practical

15. Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior

17. Privacy-Preserving Localization using Enclaves

18. ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs

21. Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

34. Mo(bile) Money, Mo(bile) Problems

35. Characterizing the Security of the SMS Ecosystem with Public Gateways.

39. Kells

41. Kells.

42. Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.

Catalog

Books, media, physical & digital resources