724 results on '"Gene Tsudik"'
Search Results
2. PsfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants.
3. Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols.
4. ProvCam: A Camera Module with Self-Contained TCB for Producing Verifiable Videos.
5. Acoustic Side-Channel Attacks on a Computer Mouse.
6. Toward Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices.
7. The SA4P Framework: Sensing and Actuation as a Privilege.
8. $\mathcal{P}\text{ARseL}$: Towards a Verified Root-of-Trust Over seL4.
9. An Empirical Study & Evaluation of Modern CAPTCHAs.
10. Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence.
11. Staving off the IoT Armageddon.
12. Poster: Control-Flow Integrity in Low-end Embedded Devices.
13. Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
14. Balancing Security and Privacy in Genomic Range Queries.
15. CASU: Compromise Avoidance via Secure Update for Low-End Embedded Systems.
16. V'CER: Efficient Certificate Validation in Constrained Networks.
17. GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices).
18. SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier.
19. Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA.
20. Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection.
21. Vronicle: verifiable provenance for videos from mobile devices.
22. We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads.
23. SEDIMENT: An IoT-device-centric Methodology for Scalable 5G Network Security.
24. VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests.
25. PARseL: Towards a Verified Root-of-Trust over seL4.
26. Dazed & Confused: A Large-Scale Real-World User Study of reCAPTCHAv2.
27. Puppy: A Publicly Verifiable Watermarking Protocol.
28. CACTI: Captcha Avoidance via Client-side TEE Integration.
29. On the Root of Trust Identification Problem.
30. Tiny-CFA: Minimalistic Control-Flow Attestation Using Verified Proofs of Execution.
31. On the TOCTOU Problem in Remote Attestation.
32. ROSEN: RObust and SElective Non-repudiation (for TLS).
33. Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation.
34. DIALED: Data Integrity Attestation for Low-end Embedded Devices.
35. SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices.
36. Exploring Effects of Auditory Stimuli on CAPTCHA Performance.
37. A Proactive Cache Privacy Attack on NDN.
38. APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
39. ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams.
40. DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon.
41. PDoT: Private DNS-over-TLS with TEE Support.
42. Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input.
43. BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication.
44. PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in low-End Embedded Systems.
45. HEALED: HEaling & Attestation for Low-End Embedded Devices.
46. VRASED: A Verified Hardware/Software Co-Design for Remote Attestation.
47. Towards Systematic Design of Collective Remote Attestation Protocols.
48. Balancing Security and Privacy in Genomic Range Queries.
49. PDoT: private DNS-over-TLS with TEE support.
50. Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard Data Entry.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.