To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins |
ACM CCS 2018
|
Efficient Public Trace-and-Revoke from Standard Assumptions |
ACM CCS 2017
|
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate |
38th IEEE Symposium on Security and Privacy
|
A Messy State of the Union: Taming the Composite State Machines of TLS |
36th IEEE Symposium on Security and Privacy
|
Web-based Attacks on Host-Proof Encrypted Storage |
WOOT '12
|