What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Michael K. Reiter
Google Scholar
128
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
Threshold Cryptography.
Akhil Bandarupalli
Adithya Bhat
Saurabh Bagchi
Aniket Kate
Michael K. Reiter
2024
conf/ccs
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery.
Chenglu Jin
Chao Yin
Marten van Dijk
Sisi Duan
Fabio Massacci
Michael K. Reiter
Haibin Zhang
2024
conf/ccs
Training Robust ML-based Raw-Binary Malware Detectors in Hours, not Months.
Keane Lucas
Weiran Lin
Lujo Bauer
Michael K. Reiter
Mahmood Sharif
2024
conf/ccs
A General Framework for Data-Use Auditing of ML Models.
Zonghao Huang
Neil Zhenqiang Gong
Michael K. Reiter
2024
conf/uss
The Impact of Exposed Passwords on Honeyword Efficacy.
Zonghao Huang
Lujo Bauer
Michael K. Reiter
2024
conf/uss
Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models.
Hongbin Liu
Michael K. Reiter
Neil Zhenqiang Gong
2024
conf/uss
Near-Optimal Constrained Padding for Object Retrievals with Dependencies.
Pranay Jain
Andrew C. Reed
Michael K. Reiter
2024
conf/uss
On the Criticality of Integrity Protection in 5G Fronthaul Networks.
Jiarong Xing
Sophia Yoo
Xenofon Foukas
Daehyeok Kim
Michael K. Reiter
2024
conf/ndss
Bernoulli Honeywords.
Ke Coby Wang
Michael K. Reiter
2024
conf/ndss
Group-based Robustness: A General Framework for Customized Robustness in the Real World.
Weiran Lin
Keane Lucas
Neo Eyal
Lujo Bauer
Michael K. Reiter
Mahmood Sharif
2024
conf/dsn
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles.
Akhil Bandarupalli
Adithya Bhat
Saurabh Bagchi
Aniket Kate
Chen-Da Liu-Zhang
Michael K. Reiter
2023
conf/uss
Distance-Aware Private Set Intersection.
Anrin Chakraborti
Giulia Fanti
Michael K. Reiter
2023
conf/uss
Adversarial Training for Raw-Binary Malware Classifiers.
Keane Lucas
Samruddhi Pai
Weiran Lin
Lujo Bauer
Michael K. Reiter
Mahmood Sharif
2023
conf/fc
The Unique Chain Rule and Its Applications.
Adithya Bhat
Akhil Bandarupalli
Saurabh Bagchi
Aniket Kate
Michael K. Reiter
2023
conf/eurosp
Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation.
Anrin Chakraborti
Michael K. Reiter
2023
conf/acsac
Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk.
Andrew Chi
Blake Anderson
Michael K. Reiter
2022
conf/ccs
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.
Weili Wang
Sen Deng
Jianyu Niu
Michael K. Reiter
Yinqian Zhang
2021
conf/uss
Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication.
Cheng Guo
Brianne Campbell
Apu Kapadia
Michael K. Reiter
Kelly Caine
2021
conf/uss
Using Amnesia to Detect Credential Database Breaches.
Ke Coby Wang
Michael K. Reiter
2021
conf/asiaccs
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes.
Keane Lucas
Mahmood Sharif
Lujo Bauer
Michael K. Reiter
Saurabh Shintre
2021
conf/ndss
TASE: Reducing Latency of Symbolic Execution with Transactional Memory.
Adam Humphries
Kartik Cating-Subramanian
Michael K. Reiter
2020
conf/uss
Detecting Stuffing of a User's Credentials at Her Own Accounts.
Ke Coby Wang
Michael K. Reiter
2019
conf/ccs
Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols.
Soumya Basu
Alin Tomescu
Ittai Abraham
Dahlia Malkhi
Michael K. Reiter
Emin Gün Sirer
2019
conf/ndss
How to End Password Reuse on the Web.
Ke Coby Wang
Michael K. Reiter
2019
conf/ndss
Statistical Privacy for Streaming Traffic.
Xiaokuan Zhang
Jihun Hamm
Michael K. Reiter
Yinqian Zhang
2019
conf/dsn
SBFT: A Scalable and Decentralized Trust Infrastructure.
Guy Golan-Gueta
Ittai Abraham
Shelly Grossman
Dahlia Malkhi
Benny Pinkas
Michael K. Reiter
Dragos-Adrian Seredinschi
Orr Tamir
Alin Tomescu
2018
conf/ccs
BEAT: Asynchronous BFT Made Practical.
Sisi Duan
Michael K. Reiter
Haibin Zhang
2018
conf/sp
Static Evaluation of Noninterference Using Approximate Model Counting.
Ziqiao Zhou
Zhiyun Qian
Michael K. Reiter
Yinqian Zhang
2017
journals/popets
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings.
Qatrunnada Ismail
Tousif Ahmed
Kelly Caine
Apu Kapadia
Michael K. Reiter
2017
journals/popets
Personalized Pseudonyms for Servers in the Cloud.
Qiuyu Xiao
Michael K. Reiter
Yinqian Zhang
2017
conf/ccs
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu.
Sanchuan Chen
Xiaokuan Zhang
Michael K. Reiter
Yinqian Zhang
2017
conf/esorics
On-Demand Time Blurring to Support Side-Channel Defense.
Weijie Liu
Debin Gao
Michael K. Reiter
2017
conf/dsn
Secure Causal Atomic Broadcast, Revisited.
Sisi Duan
Michael K. Reiter
Haibin Zhang
2016
conf/ccs
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.
Mahmood Sharif
Sruti Bhagavatula
Lujo Bauer
Michael K. Reiter
2016
conf/ccs
A Software Approach to Defeating Side Channels in Last-Level Caches.
Ziqiao Zhou
Michael K. Reiter
Yinqian Zhang
2016
conf/ccs
CCSW'16: 8th ACM Cloud Computing Security Workshop.
Elli Androulaki
Michael K. Reiter
2016
conf/uss
Stealing Machine Learning Models via Prediction APIs.
Florian Tramèr
Fan Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
2016
conf/fc
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers.
Jassim Aljuraidan
Lujo Bauer
Michael K. Reiter
Matthias Beckerle
2015
conf/ccs
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms.
Qiuyu Xiao
Michael K. Reiter
Yinqian Zhang
2015
conf/ccs
Side Channels in Multi-Tenant Environments.
Michael K. Reiter
2015
conf/ccs
Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration.
Soo-Jin Moon
Vyas Sekar
Michael K. Reiter
2015
conf/soups
Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices.
Sarah J. Andrabi
Michael K. Reiter
Cynthia Sturton
2014
conf/ccs
Cross-Tenant Side-Channel Attacks in PaaS Clouds.
Yinqian Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
2014
conf/ccs
An Epidemiological Study of Malware Encounters in a Large Enterprise.
Ting-Fang Yen
Victor Heorhiadi
Alina Oprea
Michael K. Reiter
Ari Juels
2014
conf/iciss
SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading.
Victor Heorhiadi
Seyed Kaveh Fayaz
Michael K. Reiter
Vyas Sekar
2013
conf/ccs
Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud.
Yinqian Zhang
Michael K. Reiter
2013
conf/esorics
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud.
Lei Wei
Michael K. Reiter
2013
conf/ndss
Toward Online Verification of Client Behavior in Distributed Applications.
Robert A. Cochran
Michael K. Reiter
2013
conf/dsn
Mitigating access-driven timing channels in clouds using StopWatch.
Peng Li
Debin Gao
Michael K. Reiter
2012
journals/compsec
Understanding domain registration abuses.
Scott E. Coull
Andrew M. White
Ting-Fang Yen
Fabian Monrose
Michael K. Reiter
2012
conf/ccs
Cross-VM side channels and their use to extract private keys.
Yinqian Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
2012
conf/fc
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging.
Attila Altay Yavuz
Peng Ning
Michael K. Reiter
2012
conf/esorics
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud.
Lei Wei
Michael K. Reiter
2011
conf/ccs
Bounded vector signatures and their applications.
Lei Wei
Scott E. Coull
Michael K. Reiter
2011
conf/sp
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis.
Yinqian Zhang
Ari Juels
Alina Oprea
Michael K. Reiter
2011
conf/ndss
Usability Testing a Malware-Resistant Input Mechanism.
Alana Libonati
Jonathan M. McCune
Michael K. Reiter
2011
conf/dsn
Amplifying limited expert input to sanitize large network traces.
Xin Huang
Fabian Monrose
Michael K. Reiter
2010
conf/ccs
The security of modern password expiration: an algorithmic framework and empirical analysis.
Yinqian Zhang
Fabian Monrose
Michael K. Reiter
2010
conf/sec
Understanding Domain Registration Abuses.
Scott E. Coull
Andrew M. White
Ting-Fang Yen
Fabian Monrose
Michael K. Reiter
2010
conf/ndss
Server-side Verification of Client Behavior in Online Games.
Darrell Bethea
Robert A. Cochran
Michael K. Reiter
2010
conf/dsn
Zzyzx: Scalable fault tolerance through Byzantine locking.
James Hendricks
Shafeeq Sinnamohideen
Gregory R. Ganger
Michael K. Reiter
2009
conf/ccs
False data injection attacks against state estimation in electric power grids.
Yao Liu
Michael K. Reiter
Peng Ning
2009
conf/ccs
Privacy-preserving genomic computation through program specialization.
Rui Wang
XiaoFeng Wang
Zhou Li
Haixu Tang
Michael K. Reiter
Zheng Dong
2009
conf/iciss
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles.
Michael K. Reiter
Vyas Sekar
Chad Spensky
Zhenghao Zhang
2009
conf/esorics
Data Structures with Unpredictable Timing.
Darrell Bethea
Michael K. Reiter
2009
conf/ndss
Safe Passage for Passwords and Other Sensitive Data.
Jonathan M. McCune
Adrian Perrig
Michael K. Reiter
2008
conf/ccs
Towards practical biometric key generation with randomized biometric templates.
Lucas Ballard
Seny Kamara
Fabian Monrose
Michael K. Reiter
2008
conf/uss
The Practical Subtleties of Biometric Key Generation.
Lucas Ballard
Seny Kamara
Michael K. Reiter
2008
conf/ndss
Taming the Devil: Techniques for Evaluating Anonymized Network Data.
Scott E. Coull
Charles V. Wright
Angelos D. Keromytis
Fabian Monrose
Michael K. Reiter
2008
conf/icics
BinHunt: Automatically Finding Semantic Differences in Binary Programs.
Debin Gao
Michael K. Reiter
Dawn Xiaodong Song
2008
conf/dsn
AGIS: Towards automatic generation of infection signatures.
Zhuowei Li
XiaoFeng Wang
Zhenkai Liang
Michael K. Reiter
2007
conf/uss
On Web Browsing Privacy in Anonymized NetFlows.
Scott E. Coull
Michael P. Collins
Charles V. Wright
Fabian Monrose
Michael K. Reiter
2007
conf/uss
Integrity Checking in Cryptographic File Systems with Constant Trusted Storage.
Alina Oprea
Michael K. Reiter
2007
conf/sp
Minimal TCB Code Execution.
Jonathan M. McCune
Bryan Parno
Adrian Perrig
Michael K. Reiter
Arvind Seshadri
2007
conf/soups
Lessons learned from the deployment of a smartphone-based access-control system.
Lujo Bauer
Lorrie Faith Cranor
Michael K. Reiter
Kami Vaniea
2007
conf/esorics
Trustworthy Services and the Biological Analogy.
Michael K. Reiter
2007
conf/esorics
Efficient Proving for Practical Distributed Access-Control Systems.
Lujo Bauer
Scott Garriss
Michael K. Reiter
2007
conf/ndss
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
Scott E. Coull
Charles V. Wright
Fabian Monrose
Michael P. Collins
Michael K. Reiter
2007
conf/ndss
Consumable Credentials in Linear-Logic-Based Access-Control Systems.
Kevin D. Bowers
Lujo Bauer
Deepak Garg
Frank Pfenning
Michael K. Reiter
2007
conf/dsn
Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks.
Florian Oprea
Michael K. Reiter
2006
conf/ccs
Packet vaccine: black-box exploit detection and signature generation.
XiaoFeng Wang
Zhuowei Li
Jun Xu
Michael K. Reiter
Chongkyung Kil
Jong Youl Choi
2006
conf/esorics
A Linear Logic of Authorization and Knowledge.
Deepak Garg
Lujo Bauer
Kevin D. Bowers
Frank Pfenning
Michael K. Reiter
2006
conf/esorics
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors.
Michael P. Collins
Michael K. Reiter
2006
conf/dsn
A Multi-Resolution Approach for Worm Detection and Containment.
Vyas Sekar
Yinglian Xie
Michael K. Reiter
Hui Zhang
2006
conf/acsac
Protecting Privacy in Key-Value Search Systems.
Yinglian Xie
Michael K. Reiter
David R. O'Hallaron
2005
conf/sp
Distributed Proving in Access-Control Systems.
Lujo Bauer
Scott Garriss
Michael K. Reiter
2005
conf/sp
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication.
Jonathan M. McCune
Adrian Perrig
Michael K. Reiter
2005
conf/sp
Worm Origin Identification Using Random Moonwalks.
Yinglian Xie
Vyas Sekar
David A. Maltz
Michael K. Reiter
Hui Zhang
2005
conf/sp
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
Jonathan M. McCune
Elaine Shi
Adrian Perrig
Michael K. Reiter
2005
conf/acns
Building Reliable Mix Networks with Fair Exchange.
Michael K. Reiter
XiaoFeng Wang
Matthew K. Wright
2005
conf/ih
Censorship Resistance Revisited.
Ginger Perng
Michael K. Reiter
Chenxi Wang
2005
conf/ndss
Space-Efficient Block Storage Integrity.
Alina Oprea
Michael K. Reiter
2004
conf/ccs
Fragile mixing.
Michael K. Reiter
XiaoFeng Wang
2004
conf/ccs
Gray-box extraction of execution graphs for anomaly detection.
Debin Gao
Michael K. Reiter
Dawn Xiaodong Song
2004
conf/ccs
Mitigating bandwidth-exhaustion attacks using congestion puzzles.
XiaoFeng Wang
Michael K. Reiter
2004
conf/uss
On User Choice in Graphical Password Schemes.
Darren Davis
Fabian Monrose
Michael K. Reiter
2004
conf/uss
On Gray-Box Program Tracking for Anomaly Detection.
Debin Gao
Michael K. Reiter
Dawn Xiaodong Song
2004
conf/fc
Timing Attacks in Low-Latency Mix Systems (Extended Abstract).
Brian Neil Levine
Michael K. Reiter
Chenxi Wang
Matthew K. Wright
2004
conf/sp
An Empirical Analysis of Target-Resident DoS Filters.
Michael P. Collins
Michael K. Reiter
2004
conf/acns
Private Keyword-Based Push and Pull with Applications to Anonymous Communication.
Lea Kissner
Alina Oprea
Michael K. Reiter
Dawn Xiaodong Song
Ke Yang
2004
conf/icisc
Security by, and for, Converged Mobile Devices.
Michael K. Reiter
2004
conf/icics
Time-Scoped Searching of Encrypted Audit Logs.
Darren Davis
Fabian Monrose
Michael K. Reiter
2004
conf/dsn
Efficient Byzantine-Tolerant Erasure-Coded Storage.
Garth R. Goodson
Jay J. Wylie
Gregory R. Ganger
Michael K. Reiter
2004
conf/tcc
Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract).
Philip D. MacKenzie
Michael K. Reiter
Ke Yang
2003
conf/ccs
Automatic generation of two-party computations.
Philip D. MacKenzie
Alina Oprea
Michael K. Reiter
2003
conf/sp
Defending Against Denial-of-Service Attacks with Puzzle Auction.
XiaoFeng Wang
Michael K. Reiter
2002
conf/uss
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices.
Fabian Monrose
Michael K. Reiter
Qi Li
Daniel P. Lopresti
Chilin Shih
2001
conf/ccs
Delegation of cryptographic servers for capture-resilient devices.
Philip D. MacKenzie
Michael K. Reiter
2001
conf/ccs
Discouraging Software Piracy Using Software Aging.
Markus Jakobsson
Michael K. Reiter
2001
conf/crypto
Two-Party Generation of DSA Signatures.
Philip D. MacKenzie
Michael K. Reiter
2001
conf/sp
Networked Cryptographic Devices Resilient to Capture.
Philip D. MacKenzie
Michael K. Reiter
2001
conf/sp
Cryptographic Key Generation from Voice.
Fabian Monrose
Michael K. Reiter
Qi Li
Susanne Wetzel
2000
conf/ccs
Which PKI (public key infrastructure) is the right one? (panel session).
Carlisle M. Adams
Mike Burmester
Yvo Desmedt
Michael K. Reiter
Philip R. Zimmermann
2000
conf/dsn
Dynamic Byzantine Quorum Systems.
Lorenzo Alvisi
Evelyn Tumlin Pierce
Dahlia Malkhi
Michael K. Reiter
Rebecca N. Wright
1999
conf/ccs
Password Hardening Based on Keystroke Dynamics.
Fabian Monrose
Michael K. Reiter
Susanne Wetzel
1999
conf/uss
The Design and Analysis of Graphical Passwords.
Ian Jermyn
Alain J. Mayer
Fabian Monrose
Michael K. Reiter
Aviel D. Rubin
1998
conf/sp
Secure Execution of Java Applets using a Remote Playground.
Dahlia Malkhi
Michael K. Reiter
Aviel D. Rubin
1997
conf/ccs
Path Independence for Authentication in Large-Scale Systems.
Michael K. Reiter
Stuart G. Stubblebine
1997
conf/ccs
Fair Exchange with a Semi-Trusted Third Party (extended abstract).
Matthew K. Franklin
Michael K. Reiter
1997
conf/sp
Toward Acceptable Metrics of Authentication.
Michael K. Reiter
Stuart G. Stubblebine
1996
conf/ccs
The Omega Key Management Service.
Michael K. Reiter
Matthew K. Franklin
John B. Lacy
Rebecca N. Wright
1996
conf/eurocrypt
Low-Exponent RSA with Related Messages.
Don Coppersmith
Matthew K. Franklin
Jacques Patarin
Michael K. Reiter
1995
conf/sp
The design and implementation of a secure auction service.
Matthew K. Franklin
Michael K. Reiter
1995
conf/eurocrypt
Verifiable Signature Sharing.
Matthew K. Franklin
Michael K. Reiter
1994
conf/ccs
Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart.
Michael K. Reiter
1994
conf/sp
A secure group membership protocol.
Michael K. Reiter
1993
conf/sp
Preventing denial and forgery of causal relationships in distributed systems.
Michael K. Reiter
Li Gong
1992
conf/sp
Integrating security in a group oriented distributed system.
Michael K. Reiter
Kenneth P. Birman
Li Gong
Coauthors
Adam Humphries
(1)
Adithya Bhat
(3)
Adrian Perrig
(4)
Akhil Bandarupalli
(3)
Alain J. Mayer
(1)
Alana Libonati
(1)
Alin Tomescu
(2)
Alina Oprea
(6)
Andrew C. Reed
(1)
Andrew Chi
(1)
Andrew M. White
(2)
Angelos D. Keromytis
(1)
Aniket Kate
(3)
Anrin Chakraborti
(2)
Apu Kapadia
(2)
Ari Juels
(5)
Arvind Seshadri
(1)
Attila Altay Yavuz
(1)
Aviel D. Rubin
(2)
Benny Pinkas
(1)
Blake Anderson
(1)
Brian Neil Levine
(1)
Brianne Campbell
(1)
Bryan Parno
(1)
Carlisle M. Adams
(1)
Chad Spensky
(1)
Chao Yin
(1)
Charles V. Wright
(3)
Chen-Da Liu-Zhang
(1)
Cheng Guo
(1)
Chenglu Jin
(1)
Chenxi Wang
(2)
Chilin Shih
(1)
Chongkyung Kil
(1)
Cynthia Sturton
(1)
Daehyeok Kim
(1)
Dahlia Malkhi
(4)
Daniel P. Lopresti
(1)
Darrell Bethea
(2)
Darren Davis
(2)
David A. Maltz
(1)
David R. O'Hallaron
(1)
Dawn Xiaodong Song
(4)
Debin Gao
(5)
Deepak Garg
(2)
Don Coppersmith
(1)
Dragos-Adrian Seredinschi
(1)
Elaine Shi
(1)
Elli Androulaki
(1)
Emin Gün Sirer
(1)
Evelyn Tumlin Pierce
(1)
Fabian Monrose
(14)
Fabio Massacci
(1)
Fan Zhang
(1)
Florian Oprea
(1)
Florian Tramèr
(1)
Frank Pfenning
(2)
Garth R. Goodson
(1)
Ginger Perng
(1)
Giulia Fanti
(1)
Gregory R. Ganger
(2)
Guy Golan-Gueta
(1)
Haibin Zhang
(3)
Haixu Tang
(1)
Hongbin Liu
(1)
Hui Zhang
(2)
Ian Jermyn
(1)
Ittai Abraham
(2)
Jacques Patarin
(1)
James Hendricks
(1)
Jassim Aljuraidan
(1)
Jay J. Wylie
(1)
Jianyu Niu
(1)
Jiarong Xing
(1)
Jihun Hamm
(1)
John B. Lacy
(1)
Jonathan M. McCune
(5)
Jong Youl Choi
(1)
Jun Xu
(1)
Kami Vaniea
(1)
Kartik Cating-Subramanian
(1)
Ke Coby Wang
(4)
Ke Yang
(2)
Keane Lucas
(4)
Kelly Caine
(2)
Kenneth P. Birman
(1)
Kevin D. Bowers
(2)
Lea Kissner
(1)
Lei Wei
(3)
Li Gong
(2)
Lorenzo Alvisi
(1)
Lorrie Faith Cranor
(1)
Lucas Ballard
(2)
Lujo Bauer
(12)
Mahmood Sharif
(5)
Markus Jakobsson
(1)
Marten van Dijk
(1)
Matthew K. Franklin
(5)
Matthew K. Wright
(2)
Matthias Beckerle
(1)
Michael K. Reiter
(128)
Michael P. Collins
(4)
Mike Burmester
(1)
Neil Zhenqiang Gong
(2)
Neo Eyal
(1)
Orr Tamir
(1)
Peng Li
(1)
Peng Ning
(2)
Philip D. MacKenzie
(5)
Philip R. Zimmermann
(1)
Pranay Jain
(1)
Qatrunnada Ismail
(1)
Qi Li
(2)
Qiuyu Xiao
(2)
Rebecca N. Wright
(2)
Robert A. Cochran
(2)
Rui Wang
(1)
Samruddhi Pai
(1)
Sanchuan Chen
(1)
Sarah J. Andrabi
(1)
Saurabh Bagchi
(3)
Saurabh Shintre
(1)
Scott E. Coull
(6)
Scott Garriss
(2)
Sen Deng
(1)
Seny Kamara
(2)
Seyed Kaveh Fayaz
(1)
Shafeeq Sinnamohideen
(1)
Shelly Grossman
(1)
Sisi Duan
(3)
Soo-Jin Moon
(1)
Sophia Yoo
(1)
Soumya Basu
(1)
Sruti Bhagavatula
(1)
Stuart G. Stubblebine
(2)
Susanne Wetzel
(2)
Thomas Ristenpart
(3)
Ting-Fang Yen
(3)
Tousif Ahmed
(1)
Victor Heorhiadi
(2)
Vyas Sekar
(5)
Weijie Liu
(1)
Weili Wang
(1)
Weiran Lin
(3)
Xenofon Foukas
(1)
XiaoFeng Wang
(7)
Xiaokuan Zhang
(2)
Xin Huang
(1)
Yao Liu
(1)
Yinglian Xie
(3)
Yinqian Zhang
(12)
Yvo Desmedt
(1)
Zheng Dong
(1)
Zhenghao Zhang
(1)
Zhenkai Liang
(1)
Zhiyun Qian
(1)
Zhou Li
(1)
Zhuowei Li
(2)
Ziqiao Zhou
(2)
Zonghao Huang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to