Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage |
40th IEEE Symposium on Security and Privacy
|
"Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response |
40th IEEE Symposium on Security and Privacy
|
How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples |
40th IEEE Symposium on Security and Privacy
|
Spectre Attacks: Exploiting Speculative Execution |
40th IEEE Symposium on Security and Privacy
|
BEAT: Asynchronous BFT Made Practical |
ACM CCS 2018
|
Asking for a Friend: Evaluating Response Biases in Security User Studies |
ACM CCS 2018
|
Evaluating Fuzz Testing |
ACM CCS 2018
|
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures |
ACM CCS 2018
|
New Constructions for Forward and Backward Private Symmetric Searchable Encryption |
ACM CCS 2018
|
“What was that site doing with my Facebook password?”, Designing Password-Reuse Notifications |
ACM CCS 2018
|