What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Carlos E. Rubio-Medrano
Google Scholar
ORCID:
0000-0001-8931-6412
8
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
"It's almost like Frankenstein": Investigating the Complexities of Scientific Collaboration and Privilege Management within Research Computing Infrastructures.
Souradip Nath
Ananta Soneji
Jaejong Baek
Tiffany Bao
Adam Doupé
Carlos E. Rubio-Medrano
Gail-Joon Ahn
2024
conf/uss
SoK: Security of Programmable Logic Controllers.
Efrén López-Morales
Ulysse Planta
Carlos E. Rubio-Medrano
Ali Abbasi
Alvaro A. Cárdenas
2022
conf/sp
"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers.
Ananta Soneji
Faris Bugra Kokulu
Carlos E. Rubio-Medrano
Tiffany Bao
Ruoyu Wang
Yan Shoshitaishvili
Adam Doupé
2021
conf/uss
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service.
Zhibo Sun
Adam Oest
Penghui Zhang
Carlos E. Rubio-Medrano
Tiffany Bao
Ruoyu Wang
Ziming Zhao
Yan Shoshitaishvili
Adam Doupé
Gail-Joon Ahn
2021
conf/eurosp
Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks.
Matthew Hill
Carlos E. Rubio-Medrano
Luis Claramunt
Jaejong Baek
Gail-Joon Ahn
2021
conf/eurosp
Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies.
Luis Claramunt
Larissa Pokam Epse
Carlos E. Rubio-Medrano
Jaejong Baek
Gail-Joon Ahn
2020
conf/ccs
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems.
Efrén López-Morales
Carlos E. Rubio-Medrano
Adam Doupé
Yan Shoshitaishvili
Ruoyu Wang
Tiffany Bao
Gail-Joon Ahn
2017
conf/ccs
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control.
Carlos E. Rubio-Medrano
Josephine Lamp
Adam Doupé
Ziming Zhao
Gail-Joon Ahn
Coauthors
Adam Doupé
(5)
Adam Oest
(1)
Ali Abbasi
(1)
Alvaro A. Cárdenas
(1)
Ananta Soneji
(2)
Carlos E. Rubio-Medrano
(8)
Efrén López-Morales
(2)
Faris Bugra Kokulu
(1)
Gail-Joon Ahn
(6)
Jaejong Baek
(3)
Josephine Lamp
(1)
Larissa Pokam Epse
(1)
Luis Claramunt
(2)
Matthew Hill
(1)
Penghui Zhang
(1)
Ruoyu Wang
(3)
Souradip Nath
(1)
Tiffany Bao
(4)
Ulysse Planta
(1)
Yan Shoshitaishvili
(3)
Zhibo Sun
(1)
Ziming Zhao
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to