Search

Your search keyword '"Tsudik, Gene"' showing total 892 results

Search Constraints

Start Over You searched for: Author "Tsudik, Gene" Remove constraint Author: "Tsudik, Gene"
892 results on '"Tsudik, Gene"'

Search Results

1. KESIC: Kerberos Extensions for Smart, IoT and CPS Devices

2. Towards Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices

3. Puppy: A Publicly Verifiable Watermarking Protocol

4. Dazed & Confused: A Large-Scale Real-World User Study of reCAPTCHAv2

5. Poster: Control-Flow Integrity in Low-end Embedded Devices

6. Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence (Full Version)

7. PARseL: Towards a Verified Root-of-Trust over seL4

8. An Empirical Study & Evaluation of Modern CAPTCHAs

9. : Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants

10. Acoustic Side-Channel Attacks on a Computer Mouse

13. Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input

14. CASU: Compromise Avoidance via Secure Update for Low-end Embedded Systems

15. Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA

16. V'CER: Efficient Certificate Validation in Constrained Networks

17. Vronicle: A System for Producing Videos with Verifiable Provenance

18. VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests

19. DIALED: Data Integrity Attestation for Low-end Embedded Devices

20. GAROTA: Generalized Active Root-Of-Trust Architecture

21. Tiny-CFA: A Minimalistic Approach for Control-Flow Attestation Using Verified Proofs of Execution

22. On the Root of Trust Identification Problem

23. CACTI: Captcha Avoidance via Client-side TEE Integration

24. On the TOCTOU Problem in Remote Attestation

25. PDoT: Private DNS-over-TLS with TEE Support

26. A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise

27. PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos

29. Formally Verified Hardware/Software Co-Design for Remote Attestation

30. We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads

31. ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices

32. Thermanator: Thermal Residue-Based Post Factum Attacks On Keyboard Password Entry

33. KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks

34. Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric

35. ERASMUS: Efficient Remote Attestation via Self- Measurement for Unattended Settings

36. Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks

37. HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel)

38. FADEWICH: Fast Deauthentication over the Wireless Channel

39. Security and Privacy Analysis of NSF Future Internet Architectures

41. DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon

42. Exploring Effects of Auditory Stimuli on CAPTCHA Performance

43. Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP

44. C-FLAT: Control-FLow ATtestation for Embedded Systems Software

45. Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking

46. BEAD: Best Effort Autonomous Deletion in Content-Centric Networking

47. Practical Accounting in Content-Centric Networking (extended version)

48. Trilateral Large-Scale OSN Account Linkability Study

50. Interest-Based Access Control for Content Centric Networks (extended version)

Catalog

Books, media, physical & digital resources