Title |
Conference |
Tags |
DelegaTEE: Brokered Delegation Using Trusted Execution Environments |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
DelegaTEE: Brokered Delegation Using Trusted Execution Environments |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing. |
NDSS-2018 - san diego,usa |
|
ROTE: Rollback Protection for Trusted Execution |
usenixsecurity-2017 - vancouver,canada |
|
Software Grand Exposure: SGX Cache Attacks Are Practical |
woot-2017 - vancouver,canada |
|
Proximity Verification for Contactless Access Control and Authentication Systems |
ACSAC-2015 - los angeles,usa |
|
Logical Partitions on Many-Core Platforms |
ACSAC-2015 - los angeles,usa |
|
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound |
SecuritySymposium-2015 - washington,USA |
|
Thermal Covert Channels on Multi-core Platforms |
SecuritySymposium-2015 - washington,USA |
|
Assisted Deletion of Related Content |
ACSAC-2014 - new orleans,usa |
|
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin clients |
ACSAC-2014 - new orleans,usa |
|
Quantifying Web-Search Privacy |
CCS-2014 - Scottsdale,USA |
|
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications |
usenix-2014 - san diego,usa |
|
Detection of GPS Spoofing Attacks in Power Grids |
WiSec-2014 - Oxford,UK |
|
Smartphones as Practical and Secure Location Verification Tokens for Payments |
NDSS-2014 - San Diego,USA |
|
Panel: Challenges in Securing Medical Cyber-Physical Systems |
ACSAC-2013 - New Orleans, USA |
|
An Architecture for Concurrent Execution of Secure Environments in Clouds |
CCSW-2013 - Berlin,Germany |
|
For Some Eyes Only: Protecting Online Information Sharing |
Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA |
|
Keynote I |
CCSW-2012 - Raleigh,USA |
Security
|
Embedded Security |
USENIX-2012 - Washington, D.C. |
|
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory |
USENIX-2012 - Washington, D.C. |
|
On the Requirements for Successful GPS Spoofing Attacks |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
|
System security |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
Security
|
Realization Of Rf Distance Bounding |
19th USENIX Security Symposium-2010 - Washington DC, USA |
Security
|
Physical-Layer Identification Of Rfid Devices |
18th USENIX Security Symposium-2009 - Montreal, Canada |
Security
|
Jamming-Resistant Broadcast Communication Without Shared Keys |
18th USENIX Security Symposium-2009 - Montreal, Canada |
Security
|