ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes
|
2022 |
Shafqat, Narmeen |
Privacy-Preserving Authenticated Key Exchange for Constrained Devices
|
2022 |
Ferreira, Loïc |
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes
|
2022 |
Dijkslag, Marco |
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
|
2022 |
Günther, Felix |
Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation
|
2022 |
Sato, Shingo |
An Approach to Generate Realistic HTTP Parameters for Application Layer Deception
|
2022 |
Sahin, Merve |
Probing for Passwords - Privacy Implications of SSIDs in Probe Requests
|
2022 |
Ansohn McDougall, Johanna |
IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol
|
2022 |
Sun, Yue |
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
|
2022 |
Attema, Thomas |
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
|
2022 |
Ying, Jason H. M. |
(Commit-and-Prove) Predictable Arguments with Privacy
|
2022 |
Khoshakhlagh, Hamidreza |
FAST: Fair Auctions via Secret Transactions
|
2022 |
David, Bernardo |
A White-Box Speck Implementation Using Self-equivalence Encodings
|
2022 |
Vandersmissen, Joachim |
How Byzantine is a Send Corruption?
|
2022 |
Eldefrawy, Karim |
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques
|
2022 |
Liu, Zengrui |
Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators
|
2022 |
Martinez, Florette |
Spreading the Privacy Blanket
|
2022 |
Gordon, Dov |
Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices
|
2022 |
Banegas, Gustavo |
Faster Kyber and Dilithium on the Cortex-M4
|
2022 |
Abdulrahman, Amin |
Babel Fees via Limited Liabilities
|
2022 |
Chakravarty, Manuel M. T. |