usenix security '23 - acfa: secure runtime auditing & guaranteed device healing via active...
Published 7 months ago • 25 plays • Length 12:27Download video MP4
Download video MP3
Similar videos
-
12:45
usenix security '23 - auditing framework apis via inferred app-side security specifications
-
16:06
usenix security '23 - acorn: input validation for secure aggregation
-
10:18
usenix security '23 - qfa2sr: query-free adversarial transfer attacks to speaker recognition systems
-
14:09
usenix security '23 - fast identity online with anonymous credentials (fido-ac)
-
5:02
the integrated security operations center (isoc)
-
4:14
e-services 2.0 submission of form 1|電子服務 2.0 提交表格 1
-
13:55
usenix security '23 - framing frames: bypassing wi-fi encryption by manipulating transmit queues
-
11:18
usenix security '23 - efficient 3pc for binary circuits with application to maliciously-secure...
-
15:03
usenix security '23 - verizexe: decentralized private computation with universal setup
-
11:58
usenix security '23 - ari: attestation of real-time mission execution integrity
-
11:06
usenix security '23 - a comprehensive, formal and automated analysis of the edhoc protocol
-
10:59
usenix security '23 - tva: a multi-party computation system for secure and expressive time series...
-
10:34
usenix security '23 - face-auditor: data auditing in facial recognition systems
-
10:51
usenix security '23 - design of access control mechanisms in systems-on-chip with formal...
-
12:56
usenix security '23 - authenticated private information retrieval
-
11:09
usenix security '22 - faster yet safer: logging system via fixed-key blockcipher
-
11:19
usenix security '23 - automated analysis of protocols that use authenticated encryption: how...
-
12:42
osdi '23 - accountable authentication with privacy protection: the larch system for universal login
-
12:01
usenix security '23 - fabrid: flexible attestation-based routing for inter-domain networks
-
13:44
usenix security '23 - a large-scale measurement of website login policies
-
13:29
usenix security '22 - open to a fault: on the passive compromise of tls keys via transient errors