IEEE Symposium on Security and Privacy Courses
IEEE via YouTube Deciding Equivalence Properties in Security Protocols - Theory and Practice
IEEE via YouTube Tracking Certificate Misissuance in the Wild
IEEE via YouTube Manipulating Machine Learning - Poisoning Attacks and Countermeasures for Regression Learning
IEEE via YouTube Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two
IEEE via YouTube Locally Differentially Private Frequent Itemset Mining
IEEE via YouTube Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU
IEEE via YouTube Hardware-Enforcement of Walther-Recursive Program Functions
IEEE via YouTube Machine-Checked Proofs of Privacy for Electronic Voting Protocols
IEEE via YouTube One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation
IEEE via YouTube