What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Srdjan Capkun
Google Scholar
108
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic.
Tyler Tucker
Nathaniel Bennett
Martin Kotuliak
Simon Erni
Srdjan Capkun
Kevin R. B. Butler
Patrick Traynor
2025
conf/asiaccs
Breaking Bad: How Compilers Break Constant-Time Implementations.
Moritz Schneider
Daniele Lain
Ivan Puddu
Nicolas Dutly
Srdjan Capkun
2025
conf/uss
GNSS-WASP: GNSS Wide Area SPoofing.
Christopher Tibaldo
Harshad Sathaye
Giovanni Camurati
Srdjan Capkun
2025
conf/uss
URL Inspection Tasks: Helping Users Detect Phishing Links in Emails.
Daniele Lain
Yoshimichi Nakatsuka
Kari Kostiainen
Gene Tsudik
Srdjan Capkun
2025
conf/uss
Phishing Attacks against Password Manager Browser Extensions.
Claudio Anliker
Daniele Lain
Srdjan Capkun
2025
conf/uss
GLaDoS: Location-aware Denial-of-Service of Cellular Networks.
Simon Erni
Martin Kotuliak
Richard Baker
Ivan Martinovic
Srdjan Capkun
2025
conf/uss
LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting Satellites.
Daniele Coppola
Arslan Mumtaz
Giovanni Camurati
Harshad Sathaye
Mridula Singh
Srdjan Capkun
2024
conf/ccs
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training.
Daniele Lain
Tarek Jost
Sinisa Matetic
Kari Kostiainen
Srdjan Capkun
2024
conf/uss
PURE: Payments with UWB RElay-protection.
Daniele Coppola
Giovanni Camurati
Claudio Anliker
Xenia Hofmeier
Patrick Schaller
David A. Basin
Srdjan Capkun
2024
conf/sp
On (the Lack of) Code Confidentiality in Trusted Execution Environments.
Ivan Puddu
Moritz Schneider
Daniele Lain
Stefano Boschetto
Srdjan Capkun
2024
conf/acsac
Confidential Computing with Heterogeneous Devices at Cloud-Scale.
Aritra Dhar
Supraja Sridhara
Shweta Shinde
Srdjan Capkun
Renzo Andri
2023
conf/uss
Time for Change: How Clocks Break UWB Secure Ranging.
Claudio Anliker
Giovanni Camurati
Srdjan Capkun
2023
conf/ndss
EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems.
Marc Roeschlin
Giovanni Camurati
Pascal Brunner
Mridula Singh
Srdjan Capkun
2022
journals/tches
Composite Enclaves: Towards Disaggregated Trusted Execution.
Moritz Schneider
Aritra Dhar
Ivan Puddu
Kari Kostiainen
Srdjan Capkun
2022
conf/ccs
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation.
Karl Wüst
Kari Kostiainen
Noah Delius
Srdjan Capkun
2022
conf/uss
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging.
Patrick Leu
Giovanni Camurati
Alexander Heinrich
Marc Roeschlin
Claudio Anliker
Matthias Hollick
Srdjan Capkun
Jiska Classen
2022
conf/uss
LTrack: Stealthy Tracking of Mobile Phones in LTE.
Martin Kotuliak
Simon Erni
Patrick Leu
Marc Röschlin
Srdjan Capkun
2022
conf/sp
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study.
Daniele Lain
Kari Kostiainen
Srdjan Capkun
2022
conf/ndss
V-Range: Enabling Secure Ranging in 5G Wireless Networks.
Mridula Singh
Marc Roeschlin
Aanjhan Ranganathan
Srdjan Capkun
2022
conf/wisec
Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case Studies.
Srdjan Capkun
2021
conf/uss
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols.
Enis Ulqinaku
Hala Assal
AbdelRahman Abdou
Sonia Chiasson
Srdjan Capkun
2021
conf/uss
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend.
Ivan Puddu
Moritz Schneider
Miro Haller
Srdjan Capkun
2021
conf/ccsw-ws
ROSEN: RObust and SElective Non-repudiation (for TLS).
Srdjan Capkun
Ercan Ozturk
Gene Tsudik
Karl Wüst
2021
conf/ndss
Bitcontracts: Supporting Smart Contracts in Legacy Blockchains.
Karl Wüst
Loris Diana
Kari Kostiainen
Ghassan Karame
Sinisa Matetic
Srdjan Capkun
2021
conf/acsac
Security of Multicarrier Time-of-Flight Ranging.
Patrick Leu
Martin Kotuliak
Marc Roeschlin
Srdjan Capkun
2021
conf/wisec
Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurement.
Mridula Singh
Marc Roeschlin
Ezzat Zalzala
Patrick Leu
Srdjan Capkun
2020
conf/ccs
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts.
Karl Wüst
Sinisa Matetic
Silvan Egli
Kari Kostiainen
Srdjan Capkun
2020
conf/uss
Digital Contact Tracing.
Srdjan Capkun
2020
conf/sp
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement.
Patrick Leu
Mridula Singh
Marc Roeschlin
Kenneth G. Paterson
Srdjan Capkun
2020
conf/ndss
Snappy: Fast On-chain Payments with Practical Collaterals.
Vasilios Mavroudis
Karl Wüst
Aritra Dhar
Kari Kostiainen
Srdjan Capkun
2020
conf/ndss
ProtectIOn: Root-of-Trust for IO in Compromised Platforms.
Aritra Dhar
Enis Ulqinaku
Kari Kostiainen
Srdjan Capkun
2019
conf/uss
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband.
Mridula Singh
Patrick Leu
AbdelRahman Abdou
Srdjan Capkun
2019
conf/uss
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution.
Sinisa Matetic
Karl Wüst
Moritz Schneider
Kari Kostiainen
Ghassan Karame
Srdjan Capkun
2019
conf/fc
ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted Execution.
Karl Wüst
Sinisa Matetic
Moritz Schneider
Ian Miers
Kari Kostiainen
Srdjan Capkun
2019
conf/fc
PRCash: Fast, Private and Regulated Transactions for Digital Currencies.
Karl Wüst
Kari Kostiainen
Vedran Capkun
Srdjan Capkun
2019
conf/ndss
UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks.
Mridula Singh
Patrick Leu
Srdjan Capkun
2019
conf/acsac
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Ferdinand Brasser
Srdjan Capkun
Alexandra Dmitrienko
Tommaso Frassetto
Kari Kostiainen
Ahmad-Reza Sadeghi
2019
conf/wisec
2FA-PP: 2nd factor phishing prevention.
Enis Ulqinaku
Daniele Lain
Srdjan Capkun
2019
conf/wisec
Digital radio signal cancellation attacks: an experimental evaluation.
Daniel Moser
Vincent Lenders
Srdjan Capkun
2018
journals/tifs
Toward Shared Ownership in the Cloud.
Hubert Ritzdorf
Claudio Soriente
Ghassan O. Karame
Srdjan Marinovic
Damian Gruber
Srdjan Capkun
2018
conf/ccs
Secure Positioning and Location-Based Security for IoT and Beyond.
Srdjan Capkun
2018
conf/uss
DelegaTEE: Brokered Delegation Using Trusted Execution Environments.
Sinisa Matetic
Moritz Schneider
Andrew Miller
Ari Juels
Srdjan Capkun
2018
conf/ndss
TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing.
Hubert Ritzdorf
Karl Wüst
Arthur Gervais
Guillaume Felley
Srdjan Capkun
2018
conf/wisec
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks.
Patrick Leu
Ivan Puddu
Aanjhan Ranganathan
Srdjan Capkun
2017
conf/ccs
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks.
David M. Sommer
Aritra Dhar
Luka Malisa
Esfandiar Mohammadi
Daniel Ronzani
Srdjan Capkun
2017
conf/uss
ROTE: Rollback Protection for Trusted Execution.
Sinisa Matetic
Mansoor Ahmed
Kari Kostiainen
Aritra Dhar
David M. Sommer
Arthur Gervais
Ari Juels
Srdjan Capkun
2017
conf/esorics
Quantifying Web Adblocker Privacy.
Arthur Gervais
Alexandros Filios
Vincent Lenders
Srdjan Capkun
2017
conf/ches
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks.
Luka Malisa
Kari Kostiainen
Thomas Knell
David M. Sommer
Srdjan Capkun
2017
conf/ches
On the Security of Carrier Phase-Based Ranging.
Hildur Ólafsdóttir
Aanjhan Ranganathan
Srdjan Capkun
2017
conf/wisec
Using hover to compromise the confidentiality of user input on Android.
Enis Ulqinaku
Luka Malisa
Julinda Stefa
Alessandro Mei
Srdjan Capkun
2016
conf/ccs
Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking.
Claudio Marforio
Ramya Jayaram Masti
Claudio Soriente
Kari Kostiainen
Srdjan Capkun
2016
conf/ccs
On Information Leakage in Deduplicated Storage Systems.
Hubert Ritzdorf
Ghassan Karame
Claudio Soriente
Srdjan Capkun
2016
conf/ccs
On the Security and Performance of Proof of Work Blockchains.
Arthur Gervais
Ghassan O. Karame
Karl Wüst
Vasileios Glykantzis
Hubert Ritzdorf
Srdjan Capkun
2016
conf/sp
Verena: End-to-End Integrity Protection for Web Applications.
Nikolaos Karapanos
Alexandros Filios
Raluca Ada Popa
Srdjan Capkun
2016
conf/esorics
Quantifying Location Privacy Leakage from Transaction Prices.
Arthur Gervais
Hubert Ritzdorf
Mario Lucic
Vincent Lenders
Srdjan Capkun
2016
conf/esorics
Mobile Application Impersonation Detection Using Dynamic User Interface Extraction.
Luka Malisa
Kari Kostiainen
Michael Och
Srdjan Capkun
2015
conf/ccs
Tampering with the Delivery of Blocks and Transactions in Bitcoin.
Arthur Gervais
Hubert Ritzdorf
Ghassan O. Karame
Srdjan Capkun
2015
conf/uss
Thermal Covert Channels on Multi-core Platforms.
Ramya Jayaram Masti
Devendra Rai
Aanjhan Ranganathan
Christian Müller
Lothar Thiele
Srdjan Capkun
2015
conf/uss
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound.
Nikolaos Karapanos
Claudio Marforio
Claudio Soriente
Srdjan Capkun
2015
conf/acsac
Proximity Verification for Contactless Access Control and Authentication Systems.
Aanjhan Ranganathan
Boris Danev
Srdjan Capkun
2015
conf/acsac
Logical Partitions on Many-Core Platforms.
Ramya Jayaram Masti
Claudio Marforio
Kari Kostiainen
Claudio Soriente
Srdjan Capkun
2015
conf/wisec
UWB rapid-bit-exchange system for distance bounding.
Nils Ole Tippenhauer
Heinrich Luecken
Marc Kuhn
Srdjan Capkun
2014
conf/ccs
Quantifying Web-Search Privacy.
Arthur Gervais
Reza Shokri
Adish Singla
Srdjan Capkun
Vincent Lenders
2014
conf/uss
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications.
Nikolaos Karapanos
Srdjan Capkun
2014
conf/esorics
Enabling Short Fragments for Uncoordinated Spread Spectrum Communication.
Naveed Ahmed
Christina Pöpper
Srdjan Capkun
2014
conf/ndss
Smartphones as Practical and Secure Location Verification Tokens for Payments.
Claudio Marforio
Nikolaos Karapanos
Claudio Soriente
Kari Kostiainen
Srdjan Capkun
2014
conf/acsac
Assisted deletion of related content.
Hubert Ritzdorf
Nikolaos Karapanos
Srdjan Capkun
2014
conf/acsac
On the privacy provisions of Bloom filters in lightweight bitcoin clients.
Arthur Gervais
Srdjan Capkun
Ghassan O. Karame
Damian Gruber
2014
conf/wisec
Short paper: detection of GPS spoofing attacks in power grids.
Der-Yeuan Yu
Aanjhan Ranganathan
Thomas Locher
Srdjan Capkun
David A. Basin
2013
journals/tifs
On the Security of End-to-End Measurements Based on Packet-Pair Dispersions.
Ghassan Karame
Boris Danev
Cyrill Bannwart
Srdjan Capkun
2013
conf/ccs
Secure enrollment and practical migration for mobile trusted execution environments.
Claudio Marforio
Nikolaos Karapanos
Claudio Soriente
Kari Kostiainen
Srdjan Capkun
2013
conf/ccs
Secure data deletion from persistent media.
Joel Reardon
Hubert Ritzdorf
David A. Basin
Srdjan Capkun
2013
conf/ccs
An architecture for concurrent execution of secure environments in clouds.
Ramya Jayaram Masti
Claudio Marforio
Srdjan Capkun
2013
conf/fc
Evaluating User Privacy in Bitcoin.
Elli Androulaki
Ghassan Karame
Marc Roeschlin
Tobias Scherer
Srdjan Capkun
2013
conf/sp
On Limitations of Friendly Jamming for Confidentiality.
Nils Ole Tippenhauer
Luka Malisa
Aanjhan Ranganathan
Srdjan Capkun
2013
conf/sp
SoK: Secure Data Deletion.
Joel Reardon
David A. Basin
Srdjan Capkun
2013
conf/ndss
Tailing RFID Tags for Clone Detection.
Davide Zanetti
Srdjan Capkun
Ari Juels
2012
conf/ccs
Double-spending fast payments in bitcoin.
Ghassan Karame
Elli Androulaki
Srdjan Capkun
2012
conf/ccs
User-level secure deletion on log-structured file systems.
Joel Reardon
Claudio Marforio
Srdjan Capkun
David A. Basin
2012
conf/ccs
4th cloud computing security workshop (CCSW 2012).
Srdjan Capkun
Seny Kamara
2012
conf/uss
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory.
Joel Reardon
Srdjan Capkun
David A. Basin
2012
conf/sp
Distance Hijacking Attacks on Distance Bounding Protocols.
Cas Cremers
Kasper Bonne Rasmussen
Benedikt Schmidt
Srdjan Capkun
2012
conf/esorics
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
Aanjhan Ranganathan
Nils Ole Tippenhauer
Boris Skoric
Dave Singelée
Srdjan Capkun
2012
conf/ndss
Distance Hijacking Attacks on Distance Bounding Protocols.
Cas Cremers
Kasper Bonne Rasmussen
Srdjan Capkun
2012
conf/acsac
Enabling trusted scheduling in embedded systems.
Ramya Jayaram Masti
Claudio Marforio
Aanjhan Ranganathan
Aurélien Francillon
Srdjan Capkun
2012
conf/acsac
Analysis of the communication between colluding applications on modern smartphones.
Claudio Marforio
Hubert Ritzdorf
Aurélien Francillon
Srdjan Capkun
2012
conf/wisec
Physical-layer attacks on chirp-based ranging systems.
Aanjhan Ranganathan
Boris Danev
Aurélien Francillon
Srdjan Capkun
2011
conf/ccs
Privacy-preserving outsourcing of brute-force key searches.
Ghassan Karame
Srdjan Capkun
Ueli Maurer
2011
conf/ccs
On the requirements for successful GPS spoofing attacks.
Nils Ole Tippenhauer
Christina Pöpper
Kasper Bonne Rasmussen
Srdjan Capkun
2011
conf/soups
Home is safer than the cloud!: privacy concerns for consumer cloud storage.
Iulia Ion
Niharika Sachdeva
Ponnurangam Kumaraguru
Srdjan Capkun
2011
conf/esorics
Investigation of Signal and Message Manipulations on the Wireless Channel.
Christina Pöpper
Nils Ole Tippenhauer
Boris Danev
Srdjan Capkun
2011
conf/ndss
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars.
Aurélien Francillon
Boris Danev
Srdjan Capkun
2011
conf/acsac
Enabling secure VM-vTPM migration in private clouds.
Boris Danev
Ramya Jayaram Masti
Ghassan Karame
Srdjan Capkun
2010
conf/uss
Realization of RF Distance Bounding.
Kasper Bonne Rasmussen
Srdjan Capkun
2010
conf/soups
Influence of user perception, security needs, and social factors on device pairing method choices.
Iulia Ion
Marc Langheinrich
Ponnurangam Kumaraguru
Srdjan Capkun
2010
conf/esorics
Low-Cost Client Puzzles Based on Modular Exponentiation.
Ghassan Karame
Srdjan Capkun
2010
conf/acsac
Keeping data secret under full compromise using porter devices.
Christina Pöpper
David A. Basin
Srdjan Capkun
Cas Cremers
2010
conf/wisec
Attacks on physical-layer identification.
Boris Danev
Heinrich Luecken
Srdjan Capkun
Karim M. El Defrawy
2009
conf/ccs
Proximity-based access control for implantable medical devices.
Kasper Bonne Rasmussen
Claude Castelluccia
Thomas S. Heydt-Benjamin
Srdjan Capkun
2009
conf/uss
Jamming-resistant Broadcast Communication without Shared Keys.
Christina Pöpper
Mario Strasser
Srdjan Capkun
2009
conf/uss
Physical-layer Identification of RFID Devices.
Boris Danev
Thomas S. Heydt-Benjamin
Srdjan Capkun
2009
conf/esorics
ID-Based Secure Distance Bounding and Localization.
Nils Ole Tippenhauer
Srdjan Capkun
2009
conf/icics
Secure Remote Execution of Sequential Computations.
Ghassan Karame
Mario Strasser
Srdjan Capkun
2008
conf/ccs
Location privacy of distance bounding protocols.
Kasper Bonne Rasmussen
Srdjan Capkun
2008
conf/sp
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping.
Mario Strasser
Christina Pöpper
Srdjan Capkun
Mario Cagalj
2007
conf/acns
BAP: Broadcast Authentication Using Cryptographic Puzzles.
Patrick Schaller
Srdjan Capkun
David A. Basin
2006
conf/sp
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels.
Mario Cagalj
Jean-Pierre Hubaux
Srdjan Capkun
Ram Kumar Rengaswamy
Ilias Tsigkogiannis
Mani B. Srivastava
2002
conf/nspw
Small worlds in security systems: an analysis of the PGP certificate graph.
Srdjan Capkun
Levente Buttyán
Jean-Pierre Hubaux
Coauthors
Aanjhan Ranganathan
(10)
AbdelRahman Abdou
(2)
Adish Singla
(1)
Ahmad-Reza Sadeghi
(1)
Alessandro Mei
(1)
Alexander Heinrich
(1)
Alexandra Dmitrienko
(1)
Alexandros Filios
(2)
Andrew Miller
(1)
Ari Juels
(3)
Aritra Dhar
(6)
Arslan Mumtaz
(1)
Arthur Gervais
(8)
Aurélien Francillon
(4)
Benedikt Schmidt
(1)
Boris Danev
(8)
Boris Skoric
(1)
Cas Cremers
(3)
Christian Müller
(1)
Christina Pöpper
(6)
Christopher Tibaldo
(1)
Claude Castelluccia
(1)
Claudio Anliker
(4)
Claudio Marforio
(9)
Claudio Soriente
(7)
Cyrill Bannwart
(1)
Damian Gruber
(2)
Daniel Moser
(1)
Daniel Ronzani
(1)
Daniele Coppola
(2)
Daniele Lain
(7)
Dave Singelée
(1)
David A. Basin
(8)
David M. Sommer
(3)
Davide Zanetti
(1)
Der-Yeuan Yu
(1)
Devendra Rai
(1)
Elli Androulaki
(2)
Enis Ulqinaku
(4)
Ercan Ozturk
(1)
Esfandiar Mohammadi
(1)
Ezzat Zalzala
(1)
Ferdinand Brasser
(1)
Gene Tsudik
(2)
Ghassan Karame
(10)
Ghassan O. Karame
(4)
Giovanni Camurati
(6)
Guillaume Felley
(1)
Hala Assal
(1)
Harshad Sathaye
(2)
Heinrich Luecken
(2)
Hildur Ólafsdóttir
(1)
Hubert Ritzdorf
(9)
Ian Miers
(1)
Ilias Tsigkogiannis
(1)
Iulia Ion
(2)
Ivan Martinovic
(1)
Ivan Puddu
(5)
Jean-Pierre Hubaux
(2)
Jiska Classen
(1)
Joel Reardon
(4)
Julinda Stefa
(1)
Kari Kostiainen
(20)
Karim M. El Defrawy
(1)
Karl Wüst
(10)
Kasper Bonne Rasmussen
(6)
Kenneth G. Paterson
(1)
Kevin R. B. Butler
(1)
Levente Buttyán
(1)
Loris Diana
(1)
Lothar Thiele
(1)
Luka Malisa
(5)
Mani B. Srivastava
(1)
Mansoor Ahmed
(1)
Marc Kuhn
(1)
Marc Langheinrich
(1)
Marc Roeschlin
(7)
Marc Röschlin
(1)
Mario Cagalj
(2)
Mario Lucic
(1)
Mario Strasser
(3)
Martin Kotuliak
(4)
Matthias Hollick
(1)
Michael Och
(1)
Miro Haller
(1)
Moritz Schneider
(7)
Mridula Singh
(7)
Nathaniel Bennett
(1)
Naveed Ahmed
(1)
Nicolas Dutly
(1)
Niharika Sachdeva
(1)
Nikolaos Karapanos
(6)
Nils Ole Tippenhauer
(6)
Noah Delius
(1)
Pascal Brunner
(1)
Patrick Leu
(8)
Patrick Schaller
(2)
Patrick Traynor
(1)
Ponnurangam Kumaraguru
(2)
Raluca Ada Popa
(1)
Ram Kumar Rengaswamy
(1)
Ramya Jayaram Masti
(6)
Renzo Andri
(1)
Reza Shokri
(1)
Richard Baker
(1)
Seny Kamara
(1)
Shweta Shinde
(1)
Silvan Egli
(1)
Simon Erni
(3)
Sinisa Matetic
(7)
Sonia Chiasson
(1)
Srdjan Capkun
(108)
Srdjan Marinovic
(1)
Stefano Boschetto
(1)
Supraja Sridhara
(1)
Tarek Jost
(1)
Thomas Knell
(1)
Thomas Locher
(1)
Thomas S. Heydt-Benjamin
(2)
Tobias Scherer
(1)
Tommaso Frassetto
(1)
Tyler Tucker
(1)
Ueli Maurer
(1)
Vasileios Glykantzis
(1)
Vasilios Mavroudis
(1)
Vedran Capkun
(1)
Vincent Lenders
(4)
Xenia Hofmeier
(1)
Yoshimichi Nakatsuka
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to