YoVDO

IEEE Symposium on Security and Privacy Courses

Is Cryptographic Deniability Sufficient? Non-Expert Perceptions of Deniability in Secure Messaging
IEEE via YouTube
LAMBRETTA - Learning to Rank for Twitter Soft Moderation
IEEE via YouTube
OWL - Compositional Verification of Security Protocols via an Information-Flow Type System
IEEE via YouTube
REGA - Scalable Rowhammer Mitigation with Refresh-Generating Activations
IEEE via YouTube
Private Access Control for Function Secret Sharing
IEEE via YouTube
Shedding Light on Inconsistencies in Grid Cybersecurity - Disconnects and Recommendations
IEEE via YouTube
Blue Is the New Black - Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones
IEEE via YouTube
Man-in-the-Middle Attacks without Rogue AP - When WPAs Meet ICMP Redirects
IEEE via YouTube
Jigsaw Puzzle - Selective Backdoor Attack to Subvert Malware Classifiers
IEEE via YouTube
Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya
IEEE via YouTube
< Prev Page 39 Next >