PRIVACY-ENHANCING TECHNOLOGIES FOR MEDICAL TESTS USING GENOMIC DATA
|
2020 |
Ayday, Erman |
TRANSFORMING AND TAMING PRIVACY-BREACHING ANDROID APPLICATIONS
|
2020 |
Zhang, Mu |
A NON-INTERACTIVE DUAL CHANNEL AUTHENTICATION PROTOCOL FOR ASSURING PSUEDO-CONFIDENTTALITY
|
2020 |
Irakiza, David |
RBRIDGE: USER REPUTATION BASED TOR BRIDGE DISTRIBUTION WITH PRIVACY PRESERVATION
|
2020 |
Wang, Qiyan |
KINWRITE: HANDWRITING-BASED AUTHENTICATION USING KINECT
|
2020 |
Tian, Jing |
SECURE COMPUTATION ON FLOATING POINT NUMBERS
|
2020 |
Aliasgari, Mehrdad |
VERITO: A PRACTICAL SYSTEM FOR TRANSPARENCY AND ACCOUNTABILITY IN VIRTUAL ECONOMIES
|
2020 |
Bhaskar, Raghav |
FIX ME UP: REPAIRING ACCESS-CONTROL BUGS IN WEB APPLICATIONS ............
|
2020 |
Son, Sooel |
CLICKONOMICS: DETERMINING THE EFFECT OF ANTI-PIRACY MEASURES FOR ONE-CLICK HOSTING
|
2020 |
Lauinger, Tobias |
FRESCO: MODULAR COMPOSABLE SECURITY SERVICES FOR SOFTWARE-DEFINED NETWORKS
|
2020 |
Shin, Seungwon |
HOW PRIVACY LEAKS FROM BLUETOOTH MOUSE?
|
2020 |
Pan, Xian |
UPDATES FROM THE INTERNET BACKBONE: AN RPKI/RTR ROUTER IMPLEMENTATION, MEASUREMENTS, AND ANALYSIS
|
2020 |
Wählisch, Matthias |
ONE (BLOCK) SIZE FITS ALL: PIR AND SPIR OVER ARBITRARY-LENGTH RECORDS VIA MULTI-BLOCK PIR QUERIES
|
2020 |
Henry, Ryan |
TAILING RFID TAGS FOR CLONE DETECTION
|
2020 |
Zanetti, Davide |
AN EMPIRICAL EVALUATION OF RELAY SELECTION IN TOR
|
2020 |
Wacek, Christopher |
ANALYZING UNIQUE-BID AUCTION SITES FOR FUN AND PROFIT
|
2020 |
Samorodnitzky, Ory |
BEHIND THE SCENES OF ONLINE ATTACKS: AN ANALYSIS OF EXPLOITATION BEHAVIORS ON THE WEB
|
2020 |
Canali, Davide |
LOW-COST STANDARD SIGNATURES IN WIRELESS SENSOR NETWORKS: A CASE FOR REVIVING PRE-COMPUTATION TECHNIQUES?
|
2020 |
Ateniese, Giuseppe |
JUICE: A LONGITUDINAL STUDY OF AN SEO CAMPAIGN
|
2020 |
Wang, David Y. |
PRACTICAL TIMING SIDE CHANNEL ATTACKS AGAINST KERNEL SPACE ASLR
|
2020 |
Hund, Ralf |