Anonymous Traceback for End-to-End Encryption
|
2022 |
Kenney, Erin |
Verifying the Quality of Outsourced Training on Clouds
|
2022 |
Li, Peiyang |
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption
|
2022 |
Wang, Xingkai |
Robust and Scalable Process Isolation Against Spectre in the Cloud
|
2022 |
Schwarzl, Martin |
SecQuant: Quantifying Container System Call Exposure
|
2022 |
Jang, Sunwoo |
On Committing Authenticated-Encryption
|
2022 |
Chan, John |
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key
|
2022 |
Jiang, Jingwei |
Continuous Authentication in Secure Messaging
|
2022 |
Dowling, Benjamin |
Half-Aggregation of Schnorr Signatures with Tight Reductions
|
2022 |
Chen, Yanbo |
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps
|
2022 |
Ahmad, Javaria |
No-Label User-Level Membership Inference for ASR Model Auditing
|
2022 |
Miao, Yuantian |
A Framework for Constructing Single Secret Leader Election from MPC
|
2022 |
Backes, Michael |
AppBastion: Protection from Untrusted Apps and OSes on ARM
|
2022 |
Suciu, Darius |
Administration of Machine Learning Based Access Control
|
2022 |
Nobi, Mohammad Nur |
Efficient Unique Ring Signatures from Lattices
|
2022 |
Nguyen, Tuong Ngoc |
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems
|
2022 |
Shao, Xinhui |
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks
|
2022 |
Lee, Hyunwoo |
How to Verifiably Encrypt Many Bits for an Election?
|
2022 |
Devillez, Henri |
A Toolbox for Verifiable Tally-Hiding E-Voting Systems
|
2022 |
Cortier, Véronique |
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost
|
2022 |
Susilo, Willy |