IEEE Symposium on Security and Privacy Courses
IEEE via YouTube SoK: Computer-Aided Cryptography
IEEE via YouTube Fingerprinting the Fingerprinters - Learning to Detect Browser Fingerprinting Behaviors
IEEE via YouTube Proof-of-Learning - Definitions and Practice
IEEE via YouTube Trust, But Verify - A Longitudinal Analysis Of Android OEM Compliance and Customization
IEEE via YouTube An I/O Separation Model for Formal Verification of Kernel Implementations
IEEE via YouTube Compositional Non-Interference for Fine-Grained Concurrent Programs
IEEE via YouTube Method Confusion Attack on the Bluetooth Pairing Process
IEEE via YouTube Hardware-Software Contracts for Secure Speculation
IEEE via YouTube Ed25519 Signature Schemes - Theory and Practice
IEEE via YouTube