Author of the publication

Private Circuits II: Keeping Secrets in Tamperable Circuits.

, , , and . EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, page 308-327. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

E-ABS: Extending the Analysis-By-Synthesis Robust Classification Model to More Complex Image Domains., and . AISec@CCS, page 25-36. ACM, (2020)I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns., , and . SPSM@CCS, page 33-44. ACM, (2012)Learning Security Classifiers with Verified Global Robustness Properties., , , , , and . CCS, page 477-494. ACM, (2021)A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities., , , and . NDSS, The Internet Society, (2000)Joe-E: A Security-Oriented Subset of Java., , and . NDSS, The Internet Society, (2010)Network Detection of Interactive SSH Impostors Using Deep Learning., , , and . USENIX Security Symposium, page 4283-4300. USENIX Association, (2023)Prerendered User Interfaces for Higher-Assurance Electronic Voting., , , and . EVT, USENIX Association, (2006)Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers., , and . USENIX Security Symposium, page 815-832. USENIX Association, (2017)The effect of developer-specified explanations for permission requests on smartphone user behavior., , , , , , and . CHI, page 91-100. ACM, (2014)Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams., , , and . NeurIPS, page 15486-15497. (2021)