Cluster-Based Anonymization of Knowledge Graphs
|
2020 |
Hoang, Anh-Tu |
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes
|
2020 |
Do, Xuan Thanh |
Multi-Device for Signal
|
2020 |
Campion, Sébastien |
Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069: Abridged Conference Version
|
2020 |
Hils, Maximilian |
Super Root: A New Stealthy Rooting Technique on ARM Devices
|
2020 |
Zhang, Zhangkai |
A Breach into the Authentication with Built-in Camera (ABC) Protocol
|
2020 |
Benegui, Cezara |
A Practical System for Privacy-Preserving Video Surveillance
|
2020 |
Bentafat, Elmahdi |
Same Point Composable and Nonmalleable Obfuscated Point Functions
|
2020 |
Fenteany, Peter |
On the Cryptographic Deniability of the Signal Protocol
|
2020 |
Vatandas, Nihal |
Powerless Security: A Security Analysis of In-Home Power Line Communications Based on HomePlug AV2
|
2020 |
Hoffmann, Stefan |
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables
|
2020 |
Eldefrawy, Karim |
Publicly Evaluatable Perceptual Hashing
|
2020 |
Gennaro, Rosario |
TrollThrottle —Raising the Cost of Astroturfing
|
2020 |
Esiyok, Ikan |
Human Factors in Homograph Attack Recognition
|
2020 |
Thao, Tran Phuong |
Biometric-Authenticated Searchable Encryption
|
2020 |
Gardham, Daniel |
BioLocker: A Practical Biometric Authentication Mechanism Based on 3D Fingervein
|
2020 |
Durak, F. Betül |
When TLS Meets Proxy on Mobile
|
2020 |
Debnath, Joyanta |
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution
|
2020 |
Vo, Viet |
Game Theory-Based Approach for Defense Against APTs
|
2020 |
Rubio, Juan E. |
MemShield: GPU-Assisted Software Memory Encryption
|
2020 |
Santucci, Pierpaolo |