What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Gene Tsudik
Google Scholar
ORCID:
0000-0002-8467-8614
112
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
DB-PAISA: Discovery-Based Privacy-Agile IoT Sensing+Actuation.
Isita Bagayatkar
Youngil Kim
Gene Tsudik
2025
conf/sp
SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers.
Nimesha Wickramasinghe
Arash Shaghaghi
Gene Tsudik
Sanjay K. Jha
2025
conf/asiaccs
AuthentiSafe: Lightweight and Future-Proof Device-to-Device Authentication for IoT.
Lukas Petzi
Torsten Krauß
Alexandra Dmitrienko
Gene Tsudik
2025
conf/uss
Scoop: Mitigation of Recapture Attacks on Provenance-Based Media Authentication.
Yuxin (Myles) Liu
Habiba Farrukh
Ardalan Amiri Sani
Sharad Agarwal
Gene Tsudik
2025
conf/uss
URL Inspection Tasks: Helping Users Detect Phishing Links in Emails.
Daniele Lain
Yoshimichi Nakatsuka
Kari Kostiainen
Gene Tsudik
Srdjan Capkun
2025
conf/uss
Oblivious Digital Tokens.
Mihael Liskij
Xuhua Ding
Gene Tsudik
David A. Basin
2024
conf/ccs
Staving off the IoT Armageddon.
Gene Tsudik
2024
conf/acns
Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols.
Xavier Carpent
Seoyeon Hwang
Gene Tsudik
2024
conf/esorics
sfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants.
Seoyeon Hwang
Stanislaw Jarecki
Zane Karl
Elina van Kempen
Gene Tsudik
2024
conf/asiaccs
The SA4P Framework: Sensing and Actuation as a Privilege.
Piet De Vaere
Felix Stöger
Adrian Perrig
Gene Tsudik
2023
conf/ccs
Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence.
Sashidhar Jakkamsetti
Youngil Kim
Gene Tsudik
2023
conf/ccs
Poster: Control-Flow Integrity in Low-end Embedded Devices.
Sashidhar Jakkamsetti
Youngil Kim
Andrew Searles
Gene Tsudik
2023
conf/uss
An Empirical Study & Evaluation of Modern CAPTCHAs.
Andrew Searles
Yoshimichi Nakatsuka
Ercan Ozturk
Andrew Paverd
Gene Tsudik
Ai Enkoji
2023
conf/ndss
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests.
Scott Jordan
Yoshimichi Nakatsuka
Ercan Ozturk
Andrew Paverd
Gene Tsudik
2022
conf/uss
V'CER: Efficient Certificate Validation in Constrained Networks.
David Koisser
Patrick Jauernig
Gene Tsudik
Ahmad-Reza Sadeghi
2022
conf/uss
SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier.
Lukas Petzi
Ala Eddine Ben Yahya
Alexandra Dmitrienko
Gene Tsudik
Thomas Prantl
Samuel Kounev
2022
conf/uss
GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices).
Esmerald Aliaj
Ivan De Oliveira Nunes
Gene Tsudik
2022
conf/sp
Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA.
Ivan De Oliveira Nunes
Seoyeon Hwang
Sashidhar Jakkamsetti
Gene Tsudik
2022
conf/esorics
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads.
Kiran S. Balagani
Matteo Cardaioli
Stefano Cecconello
Mauro Conti
Gene Tsudik
2021
conf/ccs
On the TOCTOU Problem in Remote Attestation.
Ivan De Oliveira Nunes
Sashidhar Jakkamsetti
Norrathep Rattanavipanon
Gene Tsudik
2021
conf/uss
CACTI: Captcha Avoidance via Client-side TEE Integration.
Yoshimichi Nakatsuka
Ercan Ozturk
Andrew Paverd
Gene Tsudik
2021
conf/ccsw-ws
ROSEN: RObust and SElective Non-repudiation (for TLS).
Srdjan Capkun
Ercan Ozturk
Gene Tsudik
Karl Wüst
2021
conf/wisec
Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation.
Mahmoud Ammar
Bruno Crispo
Ivan De Oliveira Nunes
Gene Tsudik
2020
conf/ccs
ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams.
Frederik Armknecht
Paul Walther
Gene Tsudik
Martin Beck
Thorsten Strufe
2020
conf/ccs
Proofs or Remote Execution and Mitigation of TOCTOU Attacks.
Gene Tsudik
2020
conf/uss
APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
Ivan De Oliveira Nunes
Karim Eldefrawy
Norrathep Rattanavipanon
Gene Tsudik
2020
conf/fc
Exploring Effects of Auditory Stimuli on CAPTCHA Performance.
Bruce Berg
Tyler Kaczmarek
Alfred Kobsa
Gene Tsudik
2020
conf/esorics
DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon.
Mauro Conti
Pier Paolo Tricomi
Gene Tsudik
2019
journals/compsec
MTRA: Multi-Tier randomized remote attestation in IoT networks.
Hailun Tan
Gene Tsudik
Sanjay K. Jha
2019
conf/ccs
Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard Data Entry.
Tyler Kaczmarek
Ercan Ozturk
Gene Tsudik
2019
conf/uss
VRASED: A Verified Hardware/Software Co-Design for Remote Attestation.
Ivan De Oliveira Nunes
Karim Eldefrawy
Norrathep Rattanavipanon
Michael Steiner
Gene Tsudik
2019
conf/fc
HEALED: HEaling & Attestation for Low-End Embedded Devices.
Ahmad Ibrahim
Ahmad-Reza Sadeghi
Gene Tsudik
2019
conf/acsac
PDoT: private DNS-over-TLS with TEE support.
Yoshimichi Nakatsuka
Andrew Paverd
Gene Tsudik
2019
conf/wisec
Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion.
Karim Eldefrawy
Gene Tsudik
2018
conf/ccs
Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security.
Xavier Carpent
Karim Eldefrawy
Norrathep Rattanavipanon
Gene Tsudik
2018
conf/acns
Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric.
Tyler Kaczmarek
Ercan Ozturk
Gene Tsudik
2018
conf/acns
KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks.
Ivan Oliveira Nunes
Gene Tsudik
2018
conf/esorics
SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
Kiran S. Balagani
Mauro Conti
Paolo Gasti
Martin Georgiev
Tristan Gurtler
Daniele Lain
Charissa Miller
Kendall Molas
Nikita Samarin
Eugen Saraci
Gene Tsudik
Lynn Wu
2018
conf/host
Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware.
Xavier Carpent
Norrathep Rattanavipanon
Gene Tsudik
2017
conf/ccs
Lightweight Swarm Attestation: A Tale of Two LISA-s.
Xavier Carpent
Karim El Defrawy
Norrathep Rattanavipanon
Gene Tsudik
2017
conf/ccs
Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP.
Alberto Compagno
Mauro Conti
Daniele Lain
Gene Tsudik
2017
conf/ccs
Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping.
Zhangkai Zhang
Xuhua Ding
Gene Tsudik
Jinhua Cui
Zhoujun Li
2017
conf/ccs
Security in Personal Genomics: Lest We Forget.
Gene Tsudik
2017
conf/acns
Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks.
Bruce Berg
Tyler Kaczmarek
Alfred Kobsa
Gene Tsudik
2017
conf/cns
MTRA: Multiple-tier remote attestation in IoT networks.
Hailun Tan
Gene Tsudik
Sanjay Jha
2017
conf/dsn
FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned.
Karim Eldefrawy
Norrathep Rattanavipanon
Gene Tsudik
2017
conf/wisec
HYDRA: hybrid design for remote attestation (using a formally verified microkernel).
Karim Eldefrawy
Norrathep Rattanavipanon
Gene Tsudik
2016
conf/ccs
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Tigist Abera
N. Asokan
Lucas Davi
Jan-Erik Ekberg
Thomas Nyman
Andrew Paverd
Ahmad-Reza Sadeghi
Gene Tsudik
2016
conf/wisec
DARPA: Device Attestation Resilient to Physical Attacks.
Ahmad Ibrahim
Ahmad-Reza Sadeghi
Gene Tsudik
Shaza Zeitouni
2015
conf/ccs
SEDA: Scalable Embedded Device Attestation.
N. Asokan
Ferdinand Brasser
Ahmad Ibrahim
Ahmad-Reza Sadeghi
Matthias Schunter
Gene Tsudik
Christian Wachsmann
2015
conf/acns
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking.
Alberto Compagno
Mauro Conti
Paolo Gasti
Luigi Vincenzo Mancini
Gene Tsudik
2014
journals/tifs
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints.
Syed Taha Ali
Vijay Sivaraman
Diethelm Ostry
Gene Tsudik
Sanjay K. Jha
2014
conf/ccs
Covert ephemeral communication in named data networking.
Moreno Ambrosin
Mauro Conti
Paolo Gasti
Gene Tsudik
2014
conf/ccs
Challenges in Remote Attestation of Low-End Embedded Devices.
Gene Tsudik
2014
conf/ndss
Authentication Using Pulse-Response Biometrics.
Kasper Bonne Rasmussen
Marc Roeschlin
Ivan Martinovic
Gene Tsudik
2013
conf/esorics
Privacy-Preserving Matching of Community-Contributed Content.
Mishari Al Mishari
Paolo Gasti
Gene Tsudik
Ekin Oguz
2012
conf/sp
Hummingbird: Privacy at the Time of Twitter.
Emiliano De Cristofaro
Claudio Soriente
Gene Tsudik
Andrew Williams
2012
conf/acns
Private Computation of Spatial and Temporal Power Consumption with Smart Meters.
Zekeriya Erkin
Gene Tsudik
2012
conf/esorics
Exploring Linkability of User Reviews.
Mishari Al Mishari
Gene Tsudik
2012
conf/ndss
ANDaNA: Anonymous Named Data Networking Application.
Steve DiBenedetto
Paolo Gasti
Gene Tsudik
Ersin Uzun
2012
conf/ndss
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.
Karim Eldefrawy
Gene Tsudik
Aurélien Francillon
Daniele Perito
2012
conf/cans
Fast and Private Computation of Cardinality of Set Intersection and Union.
Emiliano De Cristofaro
Paolo Gasti
Gene Tsudik
2011
conf/ccs
Countering GATTACA: efficient and secure testing of fully-sequenced human genomes.
Pierre Baldi
Roberta Baronio
Emiliano De Cristofaro
Paolo Gasti
Gene Tsudik
2011
conf/esorics
Usability of Display-Equipped RFID Tags for Security Purposes.
Alfred Kobsa
Rishab Nithyanand
Gene Tsudik
Ersin Uzun
2011
conf/pkc
(If) Size Matters: Size-Hiding Private Set Intersection.
Giuseppe Ateniese
Emiliano De Cristofaro
Gene Tsudik
2010
conf/fc
Practical Private Set Intersection Protocols with Linear Complexity.
Emiliano De Cristofaro
Gene Tsudik
2010
conf/acns
Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
Mark Manulis
Bertram Poettering
Gene Tsudik
2010
conf/esorics
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems.
Rishab Nithyanand
Gene Tsudik
Ersin Uzun
2010
conf/esorics
Secure Code Update for Embedded Devices via Proofs of Secure Erasure.
Daniele Perito
Gene Tsudik
2010
conf/asiacrypt
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.
Emiliano De Cristofaro
Jihye Kim
Gene Tsudik
2009
conf/ccs
Logging key assurance indicators in business processes.
Fabio Massacci
Gene Tsudik
Artsiom Yautsiukhin
2009
conf/soups
Serial hook-ups: a comparative usability study of secure device pairing methods.
Alfred Kobsa
Rahim Sonawalla
Gene Tsudik
Ersin Uzun
Yang Wang
2009
conf/wisec
Collaborative authentication in unattended WSNs.
Roberto Di Pietro
Claudio Soriente
Angelo Spognardi
Gene Tsudik
2008
conf/ccs
Confronting a mobile adversary in unattended sensor networks.
Gene Tsudik
2008
conf/icisc
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks.
Jihye Kim
Gene Tsudik
2008
conf/ctrsa
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange.
Stanislaw Jarecki
Jihye Kim
Gene Tsudik
2008
conf/wisec
RFID security and privacy: long-term research or short-term tinkering?
Gene Tsudik
Mike Burmester
Ari Juels
Alfred Kobsa
David Molnar
Roberto Di Pietro
Melanie R. Rieback
2007
conf/ccs
Robust group key agreement using short broadcasts.
Stanislaw Jarecki
Jihye Kim
Gene Tsudik
2007
conf/sp
Extended Abstract: Forward-Secure Sequential Aggregate Authentication.
Di Ma
Gene Tsudik
2007
conf/ctrsa
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.
Stanislaw Jarecki
Jihye Kim
Gene Tsudik
2006
conf/ccs
Improving secure server performance by re-balancing SSL/TLS handshakes.
Claude Castelluccia
Einar Mykletun
Gene Tsudik
2006
conf/fc
Revisiting Oblivious Signature-Based Envelopes.
Samad Nasserian
Gene Tsudik
2006
conf/acns
Authentication for Paranoids: Multi-party Secret Handshakes.
Stanislaw Jarecki
Jihye Kim
Gene Tsudik
2005
conf/esorics
Sanitizable Signatures.
Giuseppe Ateniese
Daniel H. Chou
Breno de Medeiros
Gene Tsudik
2004
conf/icisc
Identity-Based Access Control for Ad Hoc Groups.
Nitesh Saxena
Gene Tsudik
Jeong Hyun Yi
2004
conf/esorics
Signature Bouquets: Immutability for Aggregated/Condensed Signatures.
Einar Mykletun
Maithili Narasimha
Gene Tsudik
2004
conf/ndss
Authentication and Integrity in Outsourced Databases.
Einar Mykletun
Maithili Narasimha
Gene Tsudik
2004
conf/asiacrypt
Secret Handshakes from CA-Oblivious Encryption.
Claude Castelluccia
Stanislaw Jarecki
Gene Tsudik
2003
conf/ctrsa
Simple Identity-Based Cryptography with Mediated RSA.
Xuhua Ding
Gene Tsudik
2003
conf/asiacrypt
Accumulating Composites and Improved Group Signing.
Gene Tsudik
Shouhuai Xu
2002
conf/fc
Quasi-Efficient Revocation in Group Signatures.
Giuseppe Ateniese
Dawn Xiaodong Song
Gene Tsudik
2002
conf/ndss
Experimenting with Server-Aided Signatures.
Xuhua Ding
Daniele Mazzocchi
Gene Tsudik
2001
conf/uss
A Method for Fast Revocation of Public Key Certificates and Security Capabilities.
Dan Boneh
Xuhua Ding
Gene Tsudik
Chi-Ming Wong
2001
conf/sec
Communication-Efficient Group Key Agreement.
Yongdae Kim
Adrian Perrig
Gene Tsudik
2000
conf/ccs
Simple and fault-tolerant key agreement for dynamic collaborative groups.
Yongdae Kim
Adrian Perrig
Gene Tsudik
2000
conf/crypto
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.
Giuseppe Ateniese
Jan Camenisch
Marc Joye
Gene Tsudik
1999
conf/fc
Some Open Issues and New Directions in Group Signatures.
Giuseppe Ateniese
Gene Tsudik
1998
conf/ccs
A Security Architecture for Computational Grids.
Ian T. Foster
Carl Kesselman
Gene Tsudik
Steven Tuecke
1998
conf/ccs
Authenticated Group Key Agreement and Friends.
Giuseppe Ateniese
Michael Steiner
Gene Tsudik
1998
conf/fc
Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties.
Matthew K. Franklin
Gene Tsudik
1997
conf/ndss
Reducing the Cost of Security in Link-State Routing.
Ralf C. Hauser
Tony Przygienda
Gene Tsudik
1996
conf/ccs
Diffie-Hellman Key Distribution Extended to Group Communication.
Michael Steiner
Gene Tsudik
Michael Waidner
1996
conf/esorics
Limitations of the Approach of Solving a Network's Security Problem with a Firewall.
Stefano Zatti
Refik Molva
Angelo Tosi
Gene Tsudik
Helmut Kurth
1996
conf/esorics
Server-Supported Signatures.
N. Asokan
Gene Tsudik
Michael Waidner
1996
conf/ndss
Mixing Email with Babel.
Ceki Gülcü
Gene Tsudik
1994
conf/esorics
Robust and Secure Password and Key Change Method.
Ralf C. Hauser
Philippe A. Janson
Refik Molva
Gene Tsudik
Els Van Herreweghen
1993
conf/ccs
On Simple and Secure Key Distribution.
Gene Tsudik
Els Van Herreweghen
1993
conf/sp
Authentication method with impersonal token cards.
Refik Molva
Gene Tsudik
1992
conf/esorics
KryptoKnight Authentication and Key Distribution System.
Refik Molva
Gene Tsudik
Els Van Herreweghen
Stefano Zatti
1992
conf/esorics
Policy Enforcement in Stub Autonomous Domains.
Gene Tsudik
1989
conf/sp
Security Issues in Policy Routing.
Deborah Estrin
Gene Tsudik
1987
conf/sp
Visa Scheme for Inter-Organization Network Security.
Deborah Estrin
Gene Tsudik
Coauthors
Adrian Perrig
(3)
Ahmad Ibrahim
(3)
Ahmad-Reza Sadeghi
(5)
Ai Enkoji
(1)
Ala Eddine Ben Yahya
(1)
Alberto Compagno
(2)
Alexandra Dmitrienko
(2)
Alfred Kobsa
(5)
Andrew Paverd
(5)
Andrew Searles
(2)
Andrew Williams
(1)
Angelo Spognardi
(1)
Angelo Tosi
(1)
Arash Shaghaghi
(1)
Ardalan Amiri Sani
(1)
Ari Juels
(1)
Artsiom Yautsiukhin
(1)
Aurélien Francillon
(1)
Bertram Poettering
(1)
Breno de Medeiros
(1)
Bruce Berg
(2)
Bruno Crispo
(1)
Carl Kesselman
(1)
Ceki Gülcü
(1)
Charissa Miller
(1)
Chi-Ming Wong
(1)
Christian Wachsmann
(1)
Claude Castelluccia
(2)
Claudio Soriente
(2)
Dan Boneh
(1)
Daniel H. Chou
(1)
Daniele Lain
(3)
Daniele Mazzocchi
(1)
Daniele Perito
(2)
David A. Basin
(1)
David Koisser
(1)
David Molnar
(1)
Dawn Xiaodong Song
(1)
Deborah Estrin
(2)
Di Ma
(1)
Diethelm Ostry
(1)
Einar Mykletun
(3)
Ekin Oguz
(1)
Elina van Kempen
(1)
Els Van Herreweghen
(3)
Emiliano De Cristofaro
(6)
Ercan Ozturk
(6)
Ersin Uzun
(4)
Esmerald Aliaj
(1)
Eugen Saraci
(1)
Fabio Massacci
(1)
Felix Stöger
(1)
Ferdinand Brasser
(1)
Frederik Armknecht
(1)
Gene Tsudik
(112)
Giuseppe Ateniese
(6)
Habiba Farrukh
(1)
Hailun Tan
(2)
Helmut Kurth
(1)
Ian T. Foster
(1)
Isita Bagayatkar
(1)
Ivan De Oliveira Nunes
(6)
Ivan Martinovic
(1)
Ivan Oliveira Nunes
(1)
Jan Camenisch
(1)
Jan-Erik Ekberg
(1)
Jeong Hyun Yi
(1)
Jihye Kim
(6)
Jinhua Cui
(1)
Kari Kostiainen
(1)
Karim El Defrawy
(1)
Karim Eldefrawy
(7)
Karl Wüst
(1)
Kasper Bonne Rasmussen
(1)
Kendall Molas
(1)
Kiran S. Balagani
(2)
Lucas Davi
(1)
Luigi Vincenzo Mancini
(1)
Lukas Petzi
(2)
Lynn Wu
(1)
Mahmoud Ammar
(1)
Maithili Narasimha
(2)
Marc Joye
(1)
Marc Roeschlin
(1)
Mark Manulis
(1)
Martin Beck
(1)
Martin Georgiev
(1)
Matteo Cardaioli
(1)
Matthew K. Franklin
(1)
Matthias Schunter
(1)
Mauro Conti
(6)
Melanie R. Rieback
(1)
Michael Steiner
(3)
Michael Waidner
(2)
Mihael Liskij
(1)
Mike Burmester
(1)
Mishari Al Mishari
(2)
Moreno Ambrosin
(1)
N. Asokan
(3)
Nikita Samarin
(1)
Nimesha Wickramasinghe
(1)
Nitesh Saxena
(1)
Norrathep Rattanavipanon
(8)
Paolo Gasti
(7)
Patrick Jauernig
(1)
Paul Walther
(1)
Philippe A. Janson
(1)
Pier Paolo Tricomi
(1)
Pierre Baldi
(1)
Piet De Vaere
(1)
Rahim Sonawalla
(1)
Ralf C. Hauser
(2)
Refik Molva
(4)
Rishab Nithyanand
(2)
Roberta Baronio
(1)
Roberto Di Pietro
(2)
Samad Nasserian
(1)
Samuel Kounev
(1)
Sanjay Jha
(1)
Sanjay K. Jha
(3)
Sashidhar Jakkamsetti
(4)
Scott Jordan
(1)
Seoyeon Hwang
(3)
Sharad Agarwal
(1)
Shaza Zeitouni
(1)
Shouhuai Xu
(1)
Srdjan Capkun
(2)
Stanislaw Jarecki
(6)
Stefano Cecconello
(1)
Stefano Zatti
(2)
Steve DiBenedetto
(1)
Steven Tuecke
(1)
Syed Taha Ali
(1)
Thomas Nyman
(1)
Thomas Prantl
(1)
Thorsten Strufe
(1)
Tigist Abera
(1)
Tony Przygienda
(1)
Torsten Krauß
(1)
Tristan Gurtler
(1)
Tyler Kaczmarek
(4)
Vijay Sivaraman
(1)
Xavier Carpent
(4)
Xuhua Ding
(5)
Yang Wang
(1)
Yongdae Kim
(2)
Yoshimichi Nakatsuka
(5)
Youngil Kim
(3)
Yuxin (Myles) Liu
(1)
Zane Karl
(1)
Zekeriya Erkin
(1)
Zhangkai Zhang
(1)
Zhoujun Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to