YoVDO

IEEE Symposium on Security and Privacy Courses

Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps
IEEE via YouTube
Deciding Equivalence Properties in Security Protocols - Theory and Practice
IEEE via YouTube
Tracking Certificate Misissuance in the Wild
IEEE via YouTube
Manipulating Machine Learning - Poisoning Attacks and Countermeasures for Regression Learning
IEEE via YouTube
Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two
IEEE via YouTube
Locally Differentially Private Frequent Itemset Mining
IEEE via YouTube
Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU
IEEE via YouTube
Hardware-Enforcement of Walther-Recursive Program Functions
IEEE via YouTube
Machine-Checked Proofs of Privacy for Electronic Voting Protocols
IEEE via YouTube
One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation
IEEE via YouTube
< Prev Page 30 Next >