Anonymous Traceback for End-to-End Encryption
|
2022 |
Kenney, Erin |
Verifying the Quality of Outsourced Training on Clouds
|
2022 |
Li, Peiyang |
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption
|
2022 |
Wang, Xingkai |
Robust and Scalable Process Isolation Against Spectre in the Cloud
|
2022 |
Schwarzl, Martin |
SecQuant: Quantifying Container System Call Exposure
|
2022 |
Jang, Sunwoo |
On Committing Authenticated-Encryption
|
2022 |
Chan, John |
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key
|
2022 |
Jiang, Jingwei |
Continuous Authentication in Secure Messaging
|
2022 |
Dowling, Benjamin |
Half-Aggregation of Schnorr Signatures with Tight Reductions
|
2022 |
Chen, Yanbo |
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps
|
2022 |
Ahmad, Javaria |
No-Label User-Level Membership Inference for ASR Model Auditing
|
2022 |
Miao, Yuantian |
A Framework for Constructing Single Secret Leader Election from MPC
|
2022 |
Backes, Michael |
AppBastion: Protection from Untrusted Apps and OSes on ARM
|
2022 |
Suciu, Darius |
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users
|
2022 |
Wagner, Isabel |
A Tale of Four Gates: Privilege Escalation and Permission Bypasses on Android Through App Components
|
2022 |
Aldoseri, Abdulla |
The Revenge of Password Crackers: Automated Training of Password Cracking Tools
|
2022 |
Campi, Alessia Michela Di |
Fuzzy Authenticated Key Exchange with Tight Security
|
2022 |
Jiang, Mingming |
Ring Signatures with User-Controlled Linkability
|
2022 |
Fiore, Dario |
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero
|
2022 |
Thyagarajan, Sri AravindaKrishnan |
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing
|
2022 |
Bootle, Jonathan |