Fidelius: Protecting User Secrets from Compromised Browsers |
40th IEEE Symposium on Security and Privacy
|
True2F: Backdoor-Resistant Authentication Tokens |
40th IEEE Symposium on Security and Privacy
|
Browser history re:visited |
WOOT '18
|
Bulletproofs: Short Proofs for Confidential Transactions and More |
39th IEEE Symposium on Security and Privacy
|
Full accounting for verifiable outsourcing |
ACM CCS 2017
|
T/Key: Second-Factor Authentication From Secure Hash Chains |
ACM CCS 2017
|
Finding and Preventing Bugs in JavaScript Bindings |
38th IEEE Symposium on Security and Privacy
|
MASHaBLE: Mobile Applications of Secret Handshakes Over Bluetooth LE |
Black Hat Asia 2017
|
Verifiable ASICs |
37th IEEE Symposium on Security and Privacy
|
The Future of Bitcoin and Cryptocurrencies |
RSAC USA 2016
|