Distance-Bounding Protocols: Verification without Time and Location |
39th IEEE Symposium on Security and Privacy
|
walk2friends: Inferring Social Links from Mobility Profiles |
ACM CCS 2017
|
Bitcoin over Tor isn't a good idea |
36th IEEE Symposium on Security and Privacy
|
Symmetric Encryption & Cryptanalysis |
RSAC USA 2014
|
Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks |
WOOT '12
|