usenix security '15 - coniks: bringing key transparency to end users
Published 2 years ago • 650 plays • Length 29:19Download video MP4
Download video MP3
Similar videos
-
26:23
usenix security '15 - recognizing functions in binaries with neural networks
-
20:30
usenix security '14 - preventing cryptographic key leakage in cloud virtual machines
-
27:35
usenix security '15 - you shouldn’t collect my secrets: thwarting sensitive keystroke leakage...
-
12:25
usenix security '22 - how to abuse and fix authenticated encryption without key commitment
-
23:38
usenix security '15 - android permissions remystified: a field study on contextual integrity
-
25:34
usenix security '15 - uipicker: user-input privacy identification in mobile applications
-
30:15
usenix security '15 - under-constrained symbolic execution: correctness checking for real code
-
2:56
watch this russian hacker break into our computer in minutes | cnbc
-
15:45
authenticated encryption
-
14:33
rethinking searchable symmetric encryption
-
22:21
usenix security '15 - faster secure computation through automatic parallelization
-
1:27:54
usenix security '15 - why johnny and janie can’t code safely: bringing software assurance...
-
10:42
usenix security '23 - multi-factor key derivation function (mfkdf) for fast, flexible, secure, &...
-
31:33
usenix security '15 - to pin or not to pin—helping app developers bullet proof their tls connections
-
30:24
usenix security '15 - reassembleable disassembling
-
1:19:58
usenix security '15 - preventing security bugs through software design
-
26:46
usenix security '17 - chainiac: proactive software-update transparency...
-
12:33
usenix security '21 - using amnesia to detect credential database breaches
-
12:32
usenix security '21 - are privacy dashboards good for end users? evaluating user perceptions...
-
13:15
pepr '23 - whatsapp key transparency
-
12:12
usenix security '21 - fragment and forge: breaking wi-fi through frame aggregation and fragmentation