Cross-App Poisoning in Software-Defined Networking |
ACM CCS 2018
|
Fast Multiparty Threshold ECDSA with Fast Trustless Setup |
ACM CCS 2018
|
MVG Mechanism: Differential Privacy under Matrix-Valued Query |
ACM CCS 2018
|
Investigating System Operators’ Perspective on Security Misconfigurations |
ACM CCS 2018
|
Web’s Sixth Sense: A Study of Scripts Accessing Smartphone Sensors |
ACM CCS 2018
|
Tracking Ransomware End-to-end |
39th IEEE Symposium on Security and Privacy
|
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives |
ACM CCS 2017
|
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services |
ACM CCS 2017
|
Verified Correctness and Security of mbedTLS HMAC-DRBG |
ACM CCS 2017
|
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks |
38th IEEE Symposium on Security and Privacy
|