IEEE Symposium on Security and Privacy Courses
IEEE via YouTube Tracking Ransomware End-to-end
IEEE via YouTube Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces
IEEE via YouTube STOCHFUZZ - Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting
IEEE via YouTube Wolverine - Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
IEEE via YouTube They Would do Better if They Worked Together - The Case of Interaction Problems Between Password Managers and Websites
IEEE via YouTube Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to Purchase IoT Devices
IEEE via YouTube