usenix security '14 - trueset: faster verifiable set computations
Published 2 years ago • 90 plays • Length 19:43Download video MP4
Download video MP3
Similar videos
-
20:11
usenix security '14 - a large-scale analysis of the security of embedded firmwares
-
21:09
usenix security '14 - x-force: force-executing binary programs for security applications
-
12:03
usenix security '23 - know your cybercriminal: evaluating attacker preferences by measuring...
-
24:02
3gse '14 - cyberciege scenario design and implementation
-
28:58
network scanning tools - network security and penetration testing
-
11:21
usenix security '22 - how and why people use virtual private networks
-
10:01
usenix security '23 - machine-checking multi-round proofs of shuffle: terelius-wikstrom and...
-
20:29
usenix security '14 - zø: an optimizing distributing zero-knowledge compiler
-
23:17
usenix security '14 - jigsaw: protecting resource access by inferring programmer expectations
-
15:03
usenix security '23 - verizexe: decentralized private computation with universal setup
-
20:28
usenix security '14 - scheduler-based defenses against cross-vm side-channels
-
21:31
usenix security '14 - towards reliable storage of 56-bit secrets in human memory
-
20:26
usenix security '14 - password portfolios and the finite-effort user: sustainably managing large
-
21:17
usenix security '14 - an internet-wide view of internet-wide scanning
-
13:33
usenix security '23 - no more reviewer #2: subverting automatic paper-reviewer assignment using...
-
18:57
usenix security '14 - sddr: light-weight, secure mobile encounters
-
20:57
usenix security '14 - brahmastra: driving apps to test the security of third-party components
-
21:06
usenix security '14 - password managers: attacks and defenses
-
13:04
usenix security '23 - knowledge expansion and counterfactual interaction for reference-based...