N. Asokan [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Exploitation Techniques and Defenses for Data-Oriented Attacks IEEESecDev-2019 - McLean, USA
PRADA: Protecting Against DNN Model Stealing Attacks IEEEEuroS&P-2019 - Stockholm, Sweden
Get in Line: Ongoing Co-Presence Verification of a Vehicle Formation Based on Driving Trajectories IEEEEuropeanSymposiumS&P-2018 - London, United Kingdom
RANDOMIZATION CAN'T STOP BPF JIT SPRAY BlackHatEU-2016 - London,uk
Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments WiSec-2016 - darmstadt,germany
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems NDSS-2016 - california,usa
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks NDSS-2016 - california,usa
LTE & IMSI CATCHER MYTHS BlackHatEU-2015 - amsterdam,netherlands
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices CCS-2014 - Scottsdale,USA
Do I know You? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications ACSAC-2013 - New Orleans, USA
Authenticated encryption primitives for size-constrained trusted computing 5th International Conference on Trust & Trustworthy Computing-2012 - Vienna, Austria
Towards User-Friendly Credential Transfer on Open Credential Platforms. ACNS-2011 - Spain