Computer Security Courses
USENIX Enigma Conference via YouTube A Million Hit Points and Infinite Charisma - How Games Can Fix Computer Security Education
USENIX Enigma Conference via YouTube Pwning ARM Debug Components
Hack In The Box Security Conference via YouTube Make Sure DSA Signing Exponentiations Really Are Constant-Time
Association for Computing Machinery (ACM) via YouTube High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
Association for Computing Machinery (ACM) via YouTube BeleniosRF - A Non-Interactive Receipt-Free Electronic Voting Scheme
Association for Computing Machinery (ACM) via YouTube Attribute-based Key Exchange with General Policies
Association for Computing Machinery (ACM) via YouTube What Else is Revealed by Order Revealing Encryption?
Association for Computing Machinery (ACM) via YouTube MEMS Gyroscopes as Physical Unclonable Functions
Association for Computing Machinery (ACM) via YouTube Computational Soundness for Dalvik Bytecode
Association for Computing Machinery (ACM) via YouTube