What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Urs Hengartner
Google Scholar
23
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sec
Uncovering Robot Joint-Level Controller Actions from Encrypted Network Traffic.
Cheng Tang
Diogo Barradas
Urs Hengartner
Yue Hu
2025
conf/sp
UnMarker: A Universal Attack on Defensive Image Watermarking.
Andre Kassis
Urs Hengartner
2024
journals/compsec
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems.
Jiayi Chen
Urs Hengartner
Hassan Khan
2023
conf/sp
Breaking Security-Critical Voice Authentication.
Andre Kassis
Urs Hengartner
2022
conf/soups
Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary Sharing.
Jiayi Chen
Urs Hengartner
Hassan Khan
2021
conf/soups
Concerned but Ineffective: User Perceptions, Methods, and Challenges when Sanitizing Old Devices for Disposal.
Jason Ceci
Hassan Khan
Urs Hengartner
Daniel Vogel
2020
conf/uss
Chaperone: Real-time Locking and Loss Prevention for Smartphones.
Jiayi Chen
Urs Hengartner
Hassan Khan
Mohammad Mannan
2019
conf/acsac
AppVeto: mobile application self-defense through resource access veto.
Tousif Osman
Mohammad Mannan
Urs Hengartner
Amr M. Youssef
2017
conf/uss
Live Lesson: Netsim: Network simulation and hacking for high schoolers.
Erinn Atwater
Cecylia Bocovich
Urs Hengartner
Ian Goldberg
2016
journals/popets
On the Privacy Implications of Location Semantics.
Berker Agir
Kévin Huguenin
Urs Hengartner
Jean-Pierre Hubaux
2016
conf/soups
Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones.
Lalit Agarwal
Hassan Khan
Urs Hengartner
2016
conf/wisec
Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices.
Erinn Atwater
Urs Hengartner
2015
conf/ccs
PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices.
Yihang Song
Urs Hengartner
2015
conf/soups
Leading Johnny to Water: Designing for Usability and Trust.
Erinn Atwater
Cecylia Bocovich
Urs Hengartner
Ed Lank
Ian Goldberg
2015
conf/soups
Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying.
Hassan Khan
Urs Hengartner
Daniel Vogel
2014
conf/ccs
pTwitterRec: a privacy-preserving personalized tweet recommendation framework.
Bisheng Liu
Urs Hengartner
2014
conf/ccs
POSTER: When and How to Implicitly Authenticate Smartphone Users.
Aaron Atwater
Hassan Khan
Urs Hengartner
2013
conf/esorics
Privacy-Preserving Processing of Raw Genomic Data.
Erman Ayday
Jean Louis Raisaro
Urs Hengartner
Adam Molyneaux
Jean-Pierre Hubaux
2012
conf/uss
Cobra: Toward Concurrent Ballot Authorization for Internet Voting.
Aleksander Essex
Jeremy Clark
Urs Hengartner
2012
conf/fc
Oblivious Printing of Secret Messages in a Multi-party Setting.
Aleksander Essex
Urs Hengartner
2011
conf/fc
Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance.
Jeremy Clark
Urs Hengartner
2010
conf/uss
On the Use of Financial Data as a Random Beacon.
Jeremy Clark
Urs Hengartner
2008
conf/uss
Panic Passwords: Authenticating under Duress.
Jeremy Clark
Urs Hengartner
Coauthors
Aaron Atwater
(1)
Adam Molyneaux
(1)
Aleksander Essex
(2)
Amr M. Youssef
(1)
Andre Kassis
(2)
Berker Agir
(1)
Bisheng Liu
(1)
Cecylia Bocovich
(2)
Cheng Tang
(1)
Daniel Vogel
(2)
Diogo Barradas
(1)
Ed Lank
(1)
Erinn Atwater
(3)
Erman Ayday
(1)
Hassan Khan
(7)
Ian Goldberg
(2)
Jason Ceci
(1)
Jean Louis Raisaro
(1)
Jean-Pierre Hubaux
(2)
Jeremy Clark
(4)
Jiayi Chen
(3)
Kévin Huguenin
(1)
Lalit Agarwal
(1)
Mohammad Mannan
(2)
Tousif Osman
(1)
Urs Hengartner
(23)
Yihang Song
(1)
Yue Hu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to