YoVDO

ACM CCS (Computer and Communications Security) Courses

A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs
Association for Computing Machinery (ACM) via YouTube
Garbling Gadgets for Boolean and Arithmetic Circuits
Association for Computing Machinery (ACM) via YouTube
Optimizing Semi-Honest Secure Multiparty Computation for the Internet
Association for Computing Machinery (ACM) via YouTube
Alternative Implementations of Secure Real Numbers
Association for Computing Machinery (ACM) via YouTube
Hypnoguard - Protecting Secrets across Sleep-Wake Cycles
Association for Computing Machinery (ACM) via YouTube
iLock - Immediate and Automatic Locking of Mobile Devices against Data Theft
Association for Computing Machinery (ACM) via YouTube
The "Web/Local" Boundary Is Fuzzy - A Security Study of Chrome's Process-based Sandboxing
Association for Computing Machinery (ACM) via YouTube
Build It, Break It, Fix It - Contesting Secure Development
Association for Computing Machinery (ACM) via YouTube
Practical Detection of Entropy Loss in Pseudo-Random Number Generators
Association for Computing Machinery (ACM) via YouTube
When CSI Meets Public WiFi - Inferring Your Mobile Phone Password via WiFi Signals
Association for Computing Machinery (ACM) via YouTube
< Prev Page 5 Next >