What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kevin R. B. Butler
Google Scholar
ORCID:
0000-0002-7498-4239
82
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Data to Infinity and Beyond: Examining Data Sharing and Reuse Practices in the Computer Security Community.
Anna Crowder
Allison Lu
Kevin Childs
Carson Stillman
Patrick Traynor
Kevin R. B. Butler
2025
conf/ndss
Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic.
Tyler Tucker
Nathaniel Bennett
Martin Kotuliak
Simon Erni
Srdjan Capkun
Kevin R. B. Butler
Patrick Traynor
2025
conf/ndss
Characterizing the Impact of Audio Deepfakes in the Presence of Cochlear Implant.
Magdalena Pasternak
Kevin Warren
Daniel Olszewski
Susan Nittrouer
Patrick Traynor
Kevin R. B. Butler
2025
conf/wisec
Exploring Unanticipated Functionality in Cellular Devices and Networks.
Kevin R. B. Butler
2025
conf/uss
SoK: Towards a Unified Approach to Applied Replicability for Computer Security.
Daniel Olszewski
Tyler Tucker
Kevin R. B. Butler
Patrick Traynor
2025
conf/uss
Analyzing the AI Nudification Application Ecosystem.
Cassidy Gibson
Daniel Olszewski
Natalie Grace Brigham
Anna Crowder
Kevin R. B. Butler
Patrick Traynor
Elissa M. Redmiles
Tadayoshi Kohno
2024
conf/ccs
"Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors.
Kevin Warren
Tyler Tucker
Anna Crowder
Daniel Olszewski
Allison Lu
Caroline Fedele
Magdalena Pasternak
Seth Layton
Kevin R. B. Butler
Carrie Gates
Patrick Traynor
2024
conf/ccs
"I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications.
Kevin Childs
Cassidy Gibson
Anna Crowder
Kevin Warren
Carson Stillman
Elissa M. Redmiles
Eakta Jain
Patrick Traynor
Kevin R. B. Butler
2024
conf/ccs
RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces.
Nathaniel Bennett
Weidong Zhu
Benjamin Simon
Ryon Kennedy
William Enck
Patrick Traynor
Kevin R. B. Butler
2024
conf/uss
SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets.
Seth Layton
Tyler Tucker
Daniel Olszewski
Kevin Warren
Kevin R. B. Butler
Patrick Traynor
2024
conf/sp
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management.
Jennifer Sheldon
Weidong Zhu
Adnan Abdullah
Sri Hrushikesh Varma Bhupathiraju
Takeshi Sugawara
Kevin R. B. Butler
Md Jahidul Islam
Sara Rampazzi
2024
conf/acsac
I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques.
Anna Crowder
Daniel Olszewski
Patrick Traynor
Kevin R. B. Butler
2024
conf/wisec
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions.
Seaver Thorn
K. Virgil English
Kevin R. B. Butler
William Enck
2023
conf/ccs
"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences.
Daniel Olszewski
Allison Lu
Carson Stillman
Kevin Warren
Cole Kitroser
Alejandro Pascual
Divyajyoti Ukirde
Kevin R. B. Butler
Patrick Traynor
2023
conf/uss
Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery.
Kyungtae Kim
Sungwoo Kim
Kevin R. B. Butler
Antonio Bianchi
Rick Kennell
Dave Tian
2023
conf/uss
Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs.
Yazhou Tu
Liqun Shan
Md. Imran Hossen
Sara Rampazzi
Kevin R. B. Butler
Xiali Hei
2023
conf/sp
Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices.
Tyler Tucker
Hunter Searle
Kevin R. B. Butler
Patrick Traynor
2023
conf/sp
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses.
Yan Long
Pirouz Naghavi
Blas Kojusner
Kevin R. B. Butler
Sara Rampazzi
Kevin Fu
2022
journals/popets
Analyzing the Monetization Ecosystem of Stalkerware.
Cassidy Gibson
Vanessa Frost
Katie Platt
Washington Garcia
Luis Vargas
Sara Rampazzi
Vincent Bindschaedler
Patrick Traynor
Kevin R. B. Butler
2022
conf/uss
Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction.
Logan Blue
Kevin Warren
Hadi Abdullah
Cassidy Gibson
Luis Vargas
Jessica O'Dell
Kevin R. B. Butler
Patrick Traynor
2022
conf/sp
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks.
Kyungtae Kim
Taegyu Kim
Ertza Warraich
Byoungyoung Lee
Kevin R. B. Butler
Antonio Bianchi
Dave Jing Tian
2022
conf/eurosp
SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android.
Mounir Elgharabawy
Blas Kojusner
Mohammad Mannan
Kevin R. B. Butler
Byron Williams
Amr M. Youssef
2022
conf/cns
HallMonitor: A Framework for Identifying Network Policy Violations in Software.
Daniel Olszewski
Weidong Zhu
Sandeep Sathyanarayana
Kevin R. B. Butler
Patrick Traynor
2022
conf/ndss
FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware.
Grant Hernandez
Marius Muench
Dominik Christian Maier
Alyssa Milburn
Shinjo Park
Tobias Scharnowski
Tyler Tucker
Patrick Traynor
Kevin R. B. Butler
2020
conf/uss
BigMAC: Fine-Grained Policy Analysis of Android Firmware.
Grant Hernandez
Dave (Jing) Tian
Anurag Swarnim Yadav
Byron J. Williams
Kevin R. B. Butler
2020
conf/ccsw-ws
Co-residency Attacks on Containers are Real.
Sushrut Shringarputale
Patrick D. McDaniel
Kevin R. B. Butler
Thomas La Porta
2019
conf/ccs
Examining DES-based Cipher Suite Support within the TLS Ecosystem.
Vanessa Frost
Dave (Jing) Tian
Christie Ruales
Vijay Prakash
Patrick Traynor
Kevin R. B. Butler
2019
conf/ccs
A Hybrid Approach to Secure Function Evaluation using SGX.
Joseph I. Choi
Dave (Jing) Tian
Grant Hernandez
Christopher Patton
Benjamin Mood
Thomas Shrimpton
Kevin R. B. Butler
Patrick Traynor
2019
conf/fc
One-Time Programs Made Practical.
Lianying Zhao
Joseph I. Choi
Didem Demirag
Kevin R. B. Butler
Mohammad Mannan
Erman Ayday
Jeremy Clark
2019
conf/sp
LBM: A Security Framework for Peripherals within the Linux Kernel.
Dave Jing Tian
Grant Hernandez
Joseph I. Choi
Vanessa Frost
Peter C. Johnson
Kevin R. B. Butler
2019
conf/ndss
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System.
Luis Vargas
Logan Blue
Vanessa Frost
Christopher Patton
Nolen Scaife
Kevin R. B. Butler
Patrick Traynor
2019
conf/ndss
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems.
Hadi Abdullah
Washington Garcia
Christian Peeters
Patrick Traynor
Kevin R. B. Butler
Joseph Wilson
2019
conf/dsn
Adversarial Video Captioning.
Suman Kalyan Adari
Washington Garcia
Kevin R. B. Butler
2019
conf/wisec
Basebads: Automated security analysis of baseband firmware: poster.
Grant Hernandez
Kevin R. B. Butler
2019
conf/wisec
Characterizing security and privacy practices in emerging digital credit applications.
Jasmine D. Bowers
Imani N. Sherman
Kevin R. B. Butler
Patrick Traynor
2019
conf/wisec
Enclave-based privacy-preserving localization: poster.
Joseph I. Choi
Dave (Jing) Tian
Tyler Ward
Kevin R. B. Butler
Patrick Traynor
John M. Shea
Tan F. Wong
2018
journals/istr
PAL: A pseudo assembly language for optimizing secure function evaluation in mobile devices.
Benjamin Mood
Kevin R. B. Butler
2018
conf/ccs
Mitigating Risk while Complying with Data Retention Laws.
Luis Vargas
Gyan Hazarika
Rachel Culpepper
Kevin R. B. Butler
Thomas Shrimpton
Doug Szajda
Patrick Traynor
2018
conf/ccs
A Discussion on Security Education in Academia.
Kevin R. B. Butler
Robert K. Cunningham
Paul C. van Oorschot
Reihaneh Safavi-Naini
Ashraf Matrawy
Jeremy Clark
2018
conf/uss
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
Dave (Jing) Tian
Grant Hernandez
Joseph I. Choi
Vanessa Frost
Christie Ruales
Patrick Traynor
Hayawardh Vijayakumar
Lee Harrison
Amir Rahmati
Michael Grace
Kevin R. B. Butler
2018
conf/sp
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding.
Christian Peeters
Hadi Abdullah
Nolen Scaife
Jasmine D. Bowers
Patrick Traynor
Bradley Reaves
Kevin R. B. Butler
2018
conf/sp
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C.
Jing (Dave) Tian
Nolen Scaife
Deepak Kumar
Michael D. Bailey
Adam Bates
Kevin R. B. Butler
2018
conf/wisec
Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies.
Grant Hernandez
Kevin R. B. Butler
2017
journals/tifs
Securing ARP/NDP From the Ground Up.
Jing (Dave) Tian
Kevin R. B. Butler
Joseph I. Choi
Patrick D. McDaniel
Padma Krishnaswamy
2017
conf/ccs
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution.
Grant Hernandez
Farhaan Fowze
Dave (Jing) Tian
Tuba Yavuz
Kevin R. B. Butler
2017
conf/soups
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services.
Jasmine D. Bowers
Bradley Reaves
Imani N. Sherman
Patrick Traynor
Kevin R. B. Butler
2016
conf/ccs
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices.
Dave (Jing) Tian
Adam Bates
Kevin R. B. Butler
Raju Rangaswami
2016
conf/uss
Making USB Great Again with USBFILTER.
Dave (Jing) Tian
Nolen Scaife
Adam Bates
Kevin R. B. Butler
Patrick Traynor
2016
conf/fc
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation.
Debayan Gupta
Benjamin Mood
Joan Feigenbaum
Kevin R. B. Butler
Patrick Traynor
2016
conf/sp
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways.
Bradley Reaves
Nolen Scaife
Dave Tian
Logan Blue
Patrick Traynor
Kevin R. B. Butler
2016
conf/eurosp
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation.
Benjamin Mood
Debayan Gupta
Henry Carter
Kevin R. B. Butler
Patrick Traynor
2016
conf/cns
Efficient and secure template blinding for biometric authentication.
Siddhant Deshmukh
Henry Carter
Grant Hernandez
Patrick Traynor
Kevin R. B. Butler
2016
conf/acsac
CPAC: securing critical infrastructure with cyber-physical access control.
Sriharsha Etigowni
Dave (Jing) Tian
Grant Hernandez
Saman A. Zonouz
Kevin R. B. Butler
2016
conf/wisec
Detecting SMS Spam in the Age of Legitimate Bulk Messaging.
Bradley Reaves
Logan Blue
Dave Tian
Patrick Traynor
Kevin R. B. Butler
2015
conf/uss
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.
Bradley Reaves
Nolen Scaife
Adam Bates
Patrick Traynor
Kevin R. B. Butler
2015
conf/uss
Trustworthy Whole-System Provenance for the Linux Kernel.
Adam Bates
Dave Tian
Kevin R. B. Butler
Thomas Moyer
2015
conf/acsac
Defending Against Malicious USB Firmware with GoodUSB.
Jing (Dave) Tian
Adam Bates
Kevin R. B. Butler
2015
conf/cans
Outsourcing Secure Two-Party Computation as a Black Box.
Henry Carter
Benjamin Mood
Patrick Traynor
Kevin R. B. Butler
2014
conf/ccs
Securing SSL Certificate Verification through Dynamic Linking.
Adam Bates
Joe Pletcher
Tyler Nichols
Braden Hollembaek
Dave Tian
Kevin R. B. Butler
Abdulrahman Alkhelaifi
2014
conf/ccs
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values.
Benjamin Mood
Debayan Gupta
Kevin R. B. Butler
Joan Feigenbaum
2014
conf/ndss
Leveraging USB to Establish Host Identity Using Commodity Devices.
Adam Bates
Ryan Leonard
Hannah Pruse
Daniel Lowd
Kevin R. B. Butler
2013
conf/uss
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices.
Henry Carter
Benjamin Mood
Patrick Traynor
Kevin R. B. Butler
2013
conf/uss
PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation.
Ben Kreuter
Abhi Shelat
Benjamin Mood
Kevin R. B. Butler
2013
conf/nspw
Forgive and forget: return to obscurity.
Matt Bishop
Emily Rine Butler
Kevin R. B. Butler
Carrie Gates
Steven Greenspan
2012
conf/ccs
Detecting co-residency with active traffic analysis techniques.
Adam Bates
Benjamin Mood
Joe Pletcher
Hannah Pruse
Masoud Valafar
Kevin R. B. Butler
2012
conf/fc
Memory-Efficient Garbled Circuit Generation for Mobile Devices.
Benjamin Mood
Lara Letaw
Kevin R. B. Butler
2012
conf/ndss
Accountable Wiretapping -or- I know they can hear you now.
Adam Bates
Kevin R. B. Butler
Micah Sherr
Clay Shields
Patrick Traynor
Dan S. Wallach
2012
conf/acsac
Hi-Fi: collecting high-fidelity whole-system provenance.
Devin J. Pohly
Stephen E. McLaughlin
Patrick D. McDaniel
Kevin R. B. Butler
2012
conf/acsac
Abusing cloud-based browsers for fun and profit.
Vasant Tendulkar
Ryan Snyder
Joe Pletcher
Kevin R. B. Butler
Ashwin Shashidharan
William Enck
2010
conf/ccs
Protecting portable storage with host validation.
Kevin R. B. Butler
Stephen E. McLaughlin
Patrick D. McDaniel
2010
conf/acsac
Kells: a protection framework for portable data.
Kevin R. B. Butler
Stephen E. McLaughlin
Patrick D. McDaniel
2010
conf/acsac
Porscha: policy oriented secure content handling in Android.
Machigar Ongtang
Kevin R. B. Butler
Patrick D. McDaniel
2009
conf/acsac
Scalable Web Content Attestation.
Thomas Moyer
Kevin R. B. Butler
Joshua Schiffman
Patrick D. McDaniel
Trent Jaeger
2008
conf/ccs
Rootkit-resistant disks.
Kevin R. B. Butler
Stephen E. McLaughlin
Patrick D. McDaniel
2008
conf/uss
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Kevin R. B. Butler
William Enck
Harri Hursti
Stephen E. McLaughlin
Patrick Traynor
Patrick D. McDaniel
2008
conf/ndss
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Patrick Traynor
Kevin R. B. Butler
William Enck
Patrick D. McDaniel
2008
conf/acsac
Defending Against Attacks on Main Memory Persistence.
William Enck
Kevin R. B. Butler
Thomas Richardson
Patrick D. McDaniel
Adam D. Smith
2007
conf/ccs
Non-volatile memory and disks: avenues for policy architectures.
Kevin R. B. Butler
Stephen E. McLaughlin
Patrick D. McDaniel
2007
conf/iciss
Towards Automated Privilege Separation.
Dhananjay Bapat
Kevin R. B. Butler
Patrick D. McDaniel
2006
conf/ccs
Optimizing BGP security by exploiting path stability.
Kevin R. B. Butler
Patrick D. McDaniel
William Aiello
2006
conf/iciss
Privacy Preserving Web-Based Email.
Kevin R. B. Butler
William Enck
Jennifer Plasterr
Patrick Traynor
Patrick D. McDaniel
2005
conf/iciss
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.
Kevin R. B. Butler
Patrick D. McDaniel
Coauthors
Abdulrahman Alkhelaifi
(1)
Abhi Shelat
(1)
Adam Bates
(10)
Adam D. Smith
(1)
Adnan Abdullah
(1)
Alejandro Pascual
(1)
Allison Lu
(3)
Alyssa Milburn
(1)
Amir Rahmati
(1)
Amr M. Youssef
(1)
Anna Crowder
(5)
Antonio Bianchi
(2)
Anurag Swarnim Yadav
(1)
Ashraf Matrawy
(1)
Ashwin Shashidharan
(1)
Ben Kreuter
(1)
Benjamin Mood
(10)
Benjamin Simon
(1)
Blas Kojusner
(2)
Braden Hollembaek
(1)
Bradley Reaves
(5)
Byoungyoung Lee
(1)
Byron J. Williams
(1)
Byron Williams
(1)
Caroline Fedele
(1)
Carrie Gates
(2)
Carson Stillman
(3)
Cassidy Gibson
(4)
Christian Peeters
(2)
Christie Ruales
(2)
Christopher Patton
(2)
Clay Shields
(1)
Cole Kitroser
(1)
Dan S. Wallach
(1)
Daniel Lowd
(1)
Daniel Olszewski
(8)
Dave (Jing) Tian
(9)
Dave Jing Tian
(2)
Dave Tian
(5)
Debayan Gupta
(3)
Deepak Kumar
(1)
Devin J. Pohly
(1)
Dhananjay Bapat
(1)
Didem Demirag
(1)
Divyajyoti Ukirde
(1)
Dominik Christian Maier
(1)
Doug Szajda
(1)
Eakta Jain
(1)
Elissa M. Redmiles
(2)
Emily Rine Butler
(1)
Erman Ayday
(1)
Ertza Warraich
(1)
Farhaan Fowze
(1)
Grant Hernandez
(10)
Gyan Hazarika
(1)
Hadi Abdullah
(3)
Hannah Pruse
(2)
Harri Hursti
(1)
Hayawardh Vijayakumar
(1)
Henry Carter
(4)
Hunter Searle
(1)
Imani N. Sherman
(2)
Jasmine D. Bowers
(3)
Jennifer Plasterr
(1)
Jennifer Sheldon
(1)
Jeremy Clark
(2)
Jessica O'Dell
(1)
Jing (Dave) Tian
(3)
Joan Feigenbaum
(2)
Joe Pletcher
(3)
John M. Shea
(1)
Joseph I. Choi
(6)
Joseph Wilson
(1)
Joshua Schiffman
(1)
K. Virgil English
(1)
Katie Platt
(1)
Kevin Childs
(2)
Kevin Fu
(1)
Kevin R. B. Butler
(82)
Kevin Warren
(6)
Kyungtae Kim
(2)
Lara Letaw
(1)
Lee Harrison
(1)
Lianying Zhao
(1)
Liqun Shan
(1)
Logan Blue
(4)
Luis Vargas
(4)
Machigar Ongtang
(1)
Magdalena Pasternak
(2)
Marius Muench
(1)
Martin Kotuliak
(1)
Masoud Valafar
(1)
Matt Bishop
(1)
Md Jahidul Islam
(1)
Md. Imran Hossen
(1)
Micah Sherr
(1)
Michael D. Bailey
(1)
Michael Grace
(1)
Mohammad Mannan
(2)
Mounir Elgharabawy
(1)
Natalie Grace Brigham
(1)
Nathaniel Bennett
(2)
Nolen Scaife
(6)
Padma Krishnaswamy
(1)
Patrick D. McDaniel
(16)
Patrick Traynor
(39)
Paul C. van Oorschot
(1)
Peter C. Johnson
(1)
Pirouz Naghavi
(1)
Rachel Culpepper
(1)
Raju Rangaswami
(1)
Reihaneh Safavi-Naini
(1)
Rick Kennell
(1)
Robert K. Cunningham
(1)
Ryan Leonard
(1)
Ryan Snyder
(1)
Ryon Kennedy
(1)
Saman A. Zonouz
(1)
Sandeep Sathyanarayana
(1)
Sara Rampazzi
(4)
Seaver Thorn
(1)
Seth Layton
(2)
Shinjo Park
(1)
Siddhant Deshmukh
(1)
Simon Erni
(1)
Srdjan Capkun
(1)
Sri Hrushikesh Varma Bhupathiraju
(1)
Sriharsha Etigowni
(1)
Stephen E. McLaughlin
(6)
Steven Greenspan
(1)
Suman Kalyan Adari
(1)
Sungwoo Kim
(1)
Susan Nittrouer
(1)
Sushrut Shringarputale
(1)
Tadayoshi Kohno
(1)
Taegyu Kim
(1)
Takeshi Sugawara
(1)
Tan F. Wong
(1)
Thomas La Porta
(1)
Thomas Moyer
(2)
Thomas Richardson
(1)
Thomas Shrimpton
(2)
Tobias Scharnowski
(1)
Trent Jaeger
(1)
Tuba Yavuz
(1)
Tyler Nichols
(1)
Tyler Tucker
(6)
Tyler Ward
(1)
Vanessa Frost
(5)
Vasant Tendulkar
(1)
Vijay Prakash
(1)
Vincent Bindschaedler
(1)
Washington Garcia
(3)
Weidong Zhu
(3)
William Aiello
(1)
William Enck
(7)
Xiali Hei
(1)
Yan Long
(1)
Yazhou Tu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to