What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
David A. Wagner
Google Scholar
134
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/esorics
Jatmo: Prompt Injection Defense by Task-Specific Finetuning.
Julien Piet
Maha Alrashed
Chawin Sitawarin
Sizhe Chen
Zeming Wei
Elizabeth Sun
Basel Alomair
David A. Wagner
2023
conf/uss
Continuous Learning for Android Malware Detection.
Yizheng Chen
Zhoujie Ding
David A. Wagner
2023
conf/uss
Network Detection of Interactive SSH Impostors Using Deep Learning.
Julien Piet
Aashish Sharma
Vern Paxson
David A. Wagner
2022
conf/soups
Runtime Permissions for Privacy in Proactive Intelligent Assistants.
Nathan Malkin
David A. Wagner
Serge Egelman
2021
conf/ccs
Learning Security Classifiers with Verified Global Robustness Properties.
Yizheng Chen
Shiqi Wang
Yue Qin
Xiaojing Liao
Suman Jana
David A. Wagner
2021
conf/ccs
SAT: Improving Adversarial Training via Curriculum-Based Loss Smoothing.
Chawin Sitawarin
Supriyo Chakraborty
David A. Wagner
2021
conf/ccs
SEAT: Similarity Encoder by Adversarial Training for Detecting Model Extraction Attack Queries.
Zhanyuan Zhang
Yizheng Chen
David A. Wagner
2021
conf/uss
Hopper: Modeling and Detecting Lateral Movement.
Grant Ho
Mayank Dhiman
Devdatta Akhawe
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
David A. Wagner
2020
conf/ccs
E-ABS: Extending the Analysis-By-Synthesis Robust Classification Model to More Complex Image Domains.
An Ju
David A. Wagner
2020
conf/sp
Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-features.
Zhanyuan Zhang
Benson Yuan
Michael McCoyd
David A. Wagner
2020
conf/sp
Minimum-Norm Adversarial Examples on KNN and KNN based Models.
Chawin Sitawarin
David A. Wagner
2020
conf/acns
Minority Reports Defense: Defending Against Adversarial Patches.
Michael McCoyd
Won Park
Steven Chen
Neil Shah
Ryan Roggenkemper
Minjune Hwang
Jason Xinyu Liu
David A. Wagner
2019
journals/popets
Privacy Attitudes of Smart Speaker Users.
Nathan Malkin
Joe Deatrick
Allen Tong
Primal Wijesekera
Serge Egelman
David A. Wagner
2019
conf/uss
Detecting and Characterizing Lateral Phishing at Scale.
Grant Ho
Asaf Cidon
Lior Gavish
Marco Schweighauser
Vern Paxson
Stefan Savage
Geoffrey M. Voelker
David A. Wagner
2019
conf/nspw
Privacy controls for always-listening devices.
Nathan Malkin
Serge Egelman
David A. Wagner
2019
conf/sp
On the Robustness of Deep K-Nearest Neighbors.
Chawin Sitawarin
David A. Wagner
2018
conf/sp
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text.
Nicholas Carlini
David A. Wagner
2018
conf/sp
Background Class Defense Against Adversarial Examples.
Michael McCoyd
David A. Wagner
2017
journals/popets
A Usability Evaluation of Tor Launcher.
Linda Naeun Lee
David Fifield
Nathan Malkin
Ganesh Iyer
Serge Egelman
David A. Wagner
2017
conf/ccs
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods.
Nicholas Carlini
David A. Wagner
2017
conf/ccs
Security and Machine Learning.
David A. Wagner
2017
conf/uss
Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers.
Thurston H. Y. Dang
Petros Maniatis
David A. Wagner
2017
conf/uss
Detecting Credential Spearphishing in Enterprise Settings.
Grant Ho
Aashish Sharma
Mobin Javed
Vern Paxson
David A. Wagner
2017
conf/sp
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences.
Primal Wijesekera
Arjun Baokar
Lynn Tsai
Joel Reardon
Serge Egelman
David A. Wagner
Konstantin Beznosov
2017
conf/sp
Towards Evaluating the Robustness of Neural Networks.
Nicholas Carlini
David A. Wagner
2017
conf/soups
Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences.
Lynn Tsai
Primal Wijesekera
Joel Reardon
Irwin Reyes
Serge Egelman
David A. Wagner
Nathan Good
Jung-Wei Chen
2017
conf/host
Breaking active-set backward-edge CFI.
Michael Theodorides
David A. Wagner
2016
conf/ccs
Smart Locks: Lessons for Securing Commodity Internet of Things Devices.
Grant Ho
Derek Leung
Pratyush Mishra
Ashkan Hosseini
Dawn Song
David A. Wagner
2016
conf/ccs
Attestation Transparency: Building secure Internet services for legacy clients.
Jethro G. Beekman
John L. Manferdelli
David A. Wagner
2016
conf/ccs
Securing Recognizers for Rich Video Applications.
Christopher Thompson
David A. Wagner
2016
conf/uss
Hidden Voice Commands.
Nicholas Carlini
Pratyush Mishra
Tavish Vaidya
Yuankai Zhang
Micah Sherr
Clay Shields
David A. Wagner
Wenchao Zhou
2016
conf/soups
Recovering High-Value Secrets with SGX and Social Authentication.
Nathan Malkin
Serge Egelman
David A. Wagner
2015
conf/ccs
The Performance Cost of Shadow Stacks and Stack Canaries.
Thurston H. Y. Dang
Petros Maniatis
David A. Wagner
2015
conf/uss
Android Permissions Remystified: A Field Study on Contextual Integrity.
Primal Wijesekera
Arjun Baokar
Ashkan Hosseini
Serge Egelman
David A. Wagner
Konstantin Beznosov
2015
conf/uss
Control-Flow Bending: On the Effectiveness of Control-Flow Integrity.
Nicholas Carlini
Antonio Barresi
Mathias Payer
David A. Wagner
Thomas R. Gross
2014
conf/ccs
Are You Ready to Lock?
Serge Egelman
Sakshi Jain
Rebecca S. Portnoff
Kerwell Liao
Sunny Consolvo
David A. Wagner
2014
conf/uss
ROP is Still Dangerous: Breaking Modern Defenses.
Nicholas Carlini
David A. Wagner
2013
conf/uss
An Empirical Study of Vulnerability Rewards Programs.
Matthew Finifter
Devdatta Akhawe
David A. Wagner
2013
conf/uss
Improved Support for Machine-assisted Ballot-level Audits.
Eric Kim
Nicholas Carlini
Andrew Chang
George Yiu
Kai Wang
David A. Wagner
2013
conf/soups
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources.
Christopher Thompson
Maritza L. Johnson
Serge Egelman
David A. Wagner
Jennifer King
2013
conf/wisa
Bifocals: Analyzing WebView Vulnerabilities in Android Applications.
Erika Chin
David A. Wagner
2012
conf/ccs
Short paper: location privacy: user behavior in the field.
Drew Fisher
Leah Dorner
David A. Wagner
2012
conf/ccs
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns.
Adrienne Porter Felt
Serge Egelman
David A. Wagner
2012
conf/ccs
AdDroid: privilege separation for applications and advertisers in Android.
Paul Pearce
Adrienne Porter Felt
Gabriel Nunez
David A. Wagner
2012
conf/ccs
Reducing attack surfaces for intra-application communication in android.
David Kantola
Erika Chin
Warren He
David A. Wagner
2012
conf/uss
Operator-Assisted Tabulation of Optical Scan Ballots.
Kai Wang
Nicholas Carlini
Eric Kim
Ivan Motyashov
Daniel Nguyen
David A. Wagner
2012
conf/uss
How to Ask for Permission.
Adrienne Porter Felt
Serge Egelman
Matthew Finifter
Devdatta Akhawe
David A. Wagner
2012
conf/uss
An Evaluation of the Google Chrome Extension Security Architecture.
Nicholas Carlini
Adrienne Porter Felt
David A. Wagner
2012
conf/uss
Automated Analysis of Election Audit Logs.
Patrick Baxter
Anne Edmundson
Keishla Ortiz
Ana Maria Quevedo
Samuel Rodríguez
Cynthia Sturton
David A. Wagner
2012
conf/soups
Android permissions: user attention, comprehension, and behavior.
Adrienne Porter Felt
Elizabeth Ha
Serge Egelman
Ariel Haney
Erika Chin
David A. Wagner
2012
conf/soups
Measuring user confidence in smartphone security and privacy.
Erika Chin
Adrienne Porter Felt
Vyas Sekar
David A. Wagner
2011
journals/joc
Tweakable Block Ciphers.
Moses D. Liskov
Ronald L. Rivest
David A. Wagner
2011
conf/ccs
Android permissions demystified.
Adrienne Porter Felt
Erika Chin
Steve Hanna
Dawn Song
David A. Wagner
2011
conf/ccs
A survey of mobile malware in the wild.
Adrienne Porter Felt
Matthew Finifter
Erika Chin
Steve Hanna
David A. Wagner
2011
conf/ccs
Diesel: applying privilege separation to database access.
Adrienne Porter Felt
Matthew Finifter
Joel Weinberger
David A. Wagner
2011
conf/uss
An Analysis of Write-in Marks on Optical Scan Ballots.
Theron Ji
Eric Kim
Raji Srikantan
Alan Tsai
Arel Cordero
David A. Wagner
2011
conf/sp
Defeating UCI: Building Stealthy and Malicious Hardware.
Cynthia Sturton
Matthew Hicks
David A. Wagner
Samuel T. King
2010
conf/uss
Efficient User-Guided Ballot Image Verification.
Arel Cordero
Theron Ji
Alan Tsai
Keaton Mowery
David A. Wagner
2010
conf/ndss
Joe-E: A Security-Oriented Subset of Java.
Adrian Mettler
David A. Wagner
Tyler Close
2009
journals/tifs
A graph approach to quantitative analysis of control-flow obfuscating transformations.
Hsin-Yi Tsai
Yu-Lun Huang
David A. Wagner
2009
conf/ccs
On voting machine design for verification and testability.
Cynthia Sturton
Susmit Jha
Sanjit A. Seshia
David A. Wagner
2009
conf/uss
Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing.
Cynthia Sturton
David A. Wagner
2009
conf/uss
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs.
David Molnar
Xue Cong Li
David A. Wagner
2009
conf/soups
Conditioned-safe ceremonies and a user study of an application to web authentication.
Chris Karlof
J. D. Tygar
David A. Wagner
2009
conf/ndss
Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication.
Chris Karlof
J. Doug Tygar
David A. Wagner
2008
conf/fse
Algebraic and Slide Attacks on KeeLoq.
Nicolas T. Courtois
Gregory V. Bard
David A. Wagner
2008
conf/ccs
Verifiable functional purity in java.
Matthew Finifter
Adrian Mettler
Naveen Sastry
David A. Wagner
2008
conf/uss
Replayable Voting Machine Audit Logs.
Arel Cordero
David A. Wagner
2008
conf/uss
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems.
J. Alex Halderman
Eric Rescorla
Hovav Shacham
David A. Wagner
2007
conf/ccs
Dynamic pharming attacks and locked same-origin policies for web browsers.
Chris Karlof
Umesh Shankar
J. Doug Tygar
David A. Wagner
2007
conf/sp
Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract).
Philippe Golle
David A. Wagner
2007
conf/tcc
From Weak to Strong Watermarking.
Nicholas Hopper
David Molnar
David A. Wagner
2006
journals/compsec
Security considerations for incremental hash functions based on pair block chaining.
Raphael Chung-Wei Phan
David A. Wagner
2006
conf/uss
Prerendered User Interfaces for Higher-Assurance Electronic Voting.
Ka-Ping Yee
David A. Wagner
Marti A. Hearst
Steven M. Bellovin
2006
conf/crypto
Cryptographic Protocols for Electronic Voting.
David A. Wagner
2006
conf/sp
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
David Molnar
Tadayoshi Kohno
Naveen Sastry
David A. Wagner
2006
conf/pkc
Generic On-Line/Off-Line Threshold Signatures.
Chris Crutchfield
David Molnar
David Turner
David A. Wagner
2006
conf/eurocrypt
Private Circuits II: Keeping Secrets in Tamperable Circuits.
Yuval Ishai
Manoj Prabhakaran
Amit Sahai
David A. Wagner
2005
conf/uss
Cryptographic Voting Protocols: A Systems Perspective.
Chris Karlof
Naveen Sastry
David A. Wagner
2005
conf/icisc
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.
David Molnar
Matt Piotrowski
David Schultz
David A. Wagner
2005
conf/ih
An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.
Stark C. Draper
Prakash Ishwar
David Molnar
Vinod M. Prabhakaran
Kannan Ramchandran
Daniel Schonberg
David A. Wagner
2005
conf/acsac
Fault Attacks on Dual-Rail Encoded Systems.
Jason Waddle
David A. Wagner
2005
conf/acsac
Model Checking An Entire Linux Distribution for Security Violations.
Benjamin Schwarz
Hao Chen
David A. Wagner
Jeremy Lin
Wei Tu
Geoff Morrison
Jacob West
2005
conf/sacrypt
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.
David Molnar
Andrea Soppera
David A. Wagner
2004
conf/fse
Towards a Unifying View of Block Cipher Cryptanalysis.
David A. Wagner
2004
conf/fse
The EAX Mode of Operation.
Mihir Bellare
Phillip Rogaway
David A. Wagner
2004
conf/ccs
Cryptanalysis of a provably secure CRT-RSA algorithm.
David A. Wagner
2004
conf/ccs
Privacy and security in library RFID: issues, practices, and architectures.
David Molnar
David A. Wagner
2004
conf/uss
Finding User/Kernel Pointer Bugs with Type Inference.
Robert Johnson
David A. Wagner
2004
conf/ches
Towards Efficient Second-Order Power Analysis.
Jason Waddle
David A. Wagner
2004
conf/ndss
Model Checking One Million Lines of C Code.
Hao Chen
Drew Dean
David A. Wagner
2004
conf/tcc
On Compressing Encrypted Data without the Encryption Key.
Mark Johnson
David A. Wagner
Kannan Ramchandran
2003
conf/crypto
Private Circuits: Securing Hardware against Probing Attacks.
Yuval Ishai
Amit Sahai
David A. Wagner
2003
conf/ches
Hidden Markov Model Cryptanalysis.
Chris Karlof
David A. Wagner
2002
conf/fse
Multiplicative Differentials.
Nikita Borisov
Monica Chew
Robert Johnson
David A. Wagner
2002
conf/fse
Integral Cryptanalysis.
Lars R. Knudsen
David A. Wagner
2002
conf/ccs
MOPS: an infrastructure for examining security properties of software.
Hao Chen
David A. Wagner
2002
conf/ccs
Mimicry attacks on host-based intrusion detection systems.
David A. Wagner
Paolo Soto
2002
conf/uss
Setuid Demystified.
Hao Chen
David A. Wagner
Drew Dean
2002
conf/crypto
A Generalized Birthday Problem.
David A. Wagner
2002
conf/crypto
Tweakable Block Ciphers.
Moses D. Liskov
Ronald L. Rivest
David A. Wagner
2002
conf/ctrsa
Homomorphic Signature Schemes.
Robert Johnson
David Molnar
Dawn Xiaodong Song
David A. Wagner
2002
conf/sacrypt
Markov Truncated Differential Cryptanalysis of Skipjack.
Ben Reichardt
David A. Wagner
2001
conf/ccs
A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
Scott A. Crosby
Ian Goldberg
Robert Johnson
Dawn Xiaodong Song
David A. Wagner
2001
conf/uss
Timing Analysis of Keystrokes and Timing Attacks on SSH.
Dawn Xiaodong Song
David A. Wagner
Xuqing Tian
2001
conf/uss
Detecting Format String Vulnerabilities with Type Qualifiers.
Umesh Shankar
Kunal Talwar
Jeffrey S. Foster
David A. Wagner
2001
conf/sp
Intrusion Detection via Static Analysis.
David A. Wagner
Drew Dean
2000
conf/fse
Real Time Cryptanalysis of A5/1 on a PC.
Alex Biryukov
Adi Shamir
David A. Wagner
2000
conf/fse
Improved Cryptanalysis of Rijndael.
Niels Ferguson
John Kelsey
Stefan Lucks
Bruce Schneier
Michael Stay
David A. Wagner
Doug Whiting
2000
conf/acisp
Security Weaknesses in a Randomized Stream Cipher.
Niels Ferguson
Bruce Schneier
David A. Wagner
2000
conf/sp
Practical Techniques for Searches on Encrypted Data.
Dawn Xiaodong Song
David A. Wagner
Adrian Perrig
2000
conf/ndss
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
David A. Wagner
Jeffrey S. Foster
Eric A. Brewer
Alexander Aiken
2000
conf/eurocrypt
Advanced Slide Attacks.
Alex Biryukov
David A. Wagner
2000
conf/asiacrypt
Cryptanalysis of the Yi-Lam Hash.
David A. Wagner
2000
conf/asiacrypt
Proofs of Security for the Unix Password Hashing Algorithm.
David A. Wagner
Ian Goldberg
1999
conf/fse
Mod n Cryptanalysis, with Applications Against RC5P and M6.
John Kelsey
Bruce Schneier
David A. Wagner
1999
conf/fse
Slide Attacks.
Alex Biryukov
David A. Wagner
1999
conf/fse
The Boomerang Attack.
David A. Wagner
1999
conf/crypto
Truncated Differentials and Skipjack.
Lars R. Knudsen
Matthew J. B. Robshaw
David A. Wagner
1998
conf/fse
Cryptanalytic Attacks on Pseudorandom Number Generators.
John Kelsey
Bruce Schneier
David A. Wagner
Chris Hall
1998
conf/fse
Cryptanalysis of TWOPRIME.
Don Coppersmith
David A. Wagner
Bruce Schneier
John Kelsey
1998
conf/fse
Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation.
David A. Wagner
1998
conf/fse
Differential Cryptanalysis of KHF.
David A. Wagner
1998
conf/crypto
Building PRFs from PRPs.
Chris Hall
David A. Wagner
John Kelsey
Bruce Schneier
1998
conf/fc
Cryptanalysis of SPEED.
Chris Hall
John Kelsey
Bruce Schneier
David A. Wagner
1998
conf/esorics
Side Channel Cryptanalysis of Product Ciphers.
John Kelsey
Bruce Schneier
David A. Wagner
Chris Hall
1998
conf/sacrypt
On the Twofish Key Schedule.
Bruce Schneier
John Kelsey
Doug Whiting
David A. Wagner
Chris Hall
1998
conf/sacrypt
Cryptanalysis of ORYX.
David A. Wagner
Leonie Simpson
Ed Dawson
John Kelsey
William Millan
Bruce Schneier
1998
conf/sacrypt
Cryptanalysis of SPEED.
Chris Hall
John Kelsey
Vincent Rijmen
Bruce Schneier
David A. Wagner
1997
conf/crypto
Cryptanalysis of the Cellular Encryption Algorithm.
David A. Wagner
Bruce Schneier
John Kelsey
1997
conf/icics
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA.
John Kelsey
Bruce Schneier
David A. Wagner
1996
conf/uss
A Secure Environment for Untrusted Helper Applications.
Ian Goldberg
David A. Wagner
Randi Thomas
Eric A. Brewer
1996
conf/crypto
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.
John Kelsey
Bruce Schneier
David A. Wagner
1996
conf/ndss
A "bump in the stack" encryptor for MS-DOS systems.
David A. Wagner
Steven M. Bellovin
Coauthors
Aashish Sharma
(2)
Adi Shamir
(1)
Adrian Mettler
(2)
Adrian Perrig
(1)
Adrienne Porter Felt
(9)
Alan Tsai
(2)
Alex Biryukov
(3)
Alexander Aiken
(1)
Allen Tong
(1)
Amit Sahai
(2)
An Ju
(1)
Ana Maria Quevedo
(1)
Andrea Soppera
(1)
Andrew Chang
(1)
Anne Edmundson
(1)
Antonio Barresi
(1)
Arel Cordero
(3)
Ariel Haney
(1)
Arjun Baokar
(2)
Asaf Cidon
(1)
Ashkan Hosseini
(2)
Basel Alomair
(1)
Ben Reichardt
(1)
Benjamin Schwarz
(1)
Benson Yuan
(1)
Bruce Schneier
(14)
Chawin Sitawarin
(4)
Chris Crutchfield
(1)
Chris Hall
(6)
Chris Karlof
(5)
Christopher Thompson
(2)
Clay Shields
(1)
Cynthia Sturton
(4)
Daniel Nguyen
(1)
Daniel Schonberg
(1)
David A. Wagner
(134)
David Fifield
(1)
David Kantola
(1)
David Molnar
(9)
David Schultz
(1)
David Turner
(1)
Dawn Song
(2)
Dawn Xiaodong Song
(4)
Derek Leung
(1)
Devdatta Akhawe
(3)
Don Coppersmith
(1)
Doug Whiting
(2)
Drew Dean
(3)
Drew Fisher
(1)
Ed Dawson
(1)
Elizabeth Ha
(1)
Elizabeth Sun
(1)
Eric A. Brewer
(2)
Eric Kim
(3)
Eric Rescorla
(1)
Erika Chin
(6)
Gabriel Nunez
(1)
Ganesh Iyer
(1)
Geoff Morrison
(1)
Geoffrey M. Voelker
(2)
George Yiu
(1)
Grant Ho
(4)
Gregory V. Bard
(1)
Hao Chen
(4)
Hovav Shacham
(1)
Hsin-Yi Tsai
(1)
Ian Goldberg
(3)
Irwin Reyes
(1)
Ivan Motyashov
(1)
J. Alex Halderman
(1)
J. D. Tygar
(1)
J. Doug Tygar
(2)
Jacob West
(1)
Jason Waddle
(2)
Jason Xinyu Liu
(1)
Jeffrey S. Foster
(2)
Jennifer King
(1)
Jeremy Lin
(1)
Jethro G. Beekman
(1)
Joe Deatrick
(1)
Joel Reardon
(2)
Joel Weinberger
(1)
John Kelsey
(13)
John L. Manferdelli
(1)
Julien Piet
(2)
Jung-Wei Chen
(1)
Ka-Ping Yee
(1)
Kai Wang
(2)
Kannan Ramchandran
(2)
Keaton Mowery
(1)
Keishla Ortiz
(1)
Kerwell Liao
(1)
Konstantin Beznosov
(2)
Kunal Talwar
(1)
Lars R. Knudsen
(2)
Leah Dorner
(1)
Leonie Simpson
(1)
Linda Naeun Lee
(1)
Lior Gavish
(1)
Lynn Tsai
(2)
Maha Alrashed
(1)
Manoj Prabhakaran
(1)
Marco Schweighauser
(1)
Maritza L. Johnson
(1)
Mark Johnson
(1)
Marti A. Hearst
(1)
Mathias Payer
(1)
Matt Piotrowski
(1)
Matthew Finifter
(5)
Matthew Hicks
(1)
Matthew J. B. Robshaw
(1)
Mayank Dhiman
(1)
Micah Sherr
(1)
Michael McCoyd
(3)
Michael Stay
(1)
Michael Theodorides
(1)
Mihir Bellare
(1)
Minjune Hwang
(1)
Mobin Javed
(1)
Monica Chew
(1)
Moses D. Liskov
(2)
Nathan Good
(1)
Nathan Malkin
(5)
Naveen Sastry
(3)
Neil Shah
(1)
Nicholas Carlini
(9)
Nicholas Hopper
(1)
Nicolas T. Courtois
(1)
Niels Ferguson
(2)
Nikita Borisov
(1)
Paolo Soto
(1)
Patrick Baxter
(1)
Paul Pearce
(1)
Petros Maniatis
(2)
Philippe Golle
(1)
Phillip Rogaway
(1)
Prakash Ishwar
(1)
Pratyush Mishra
(2)
Primal Wijesekera
(4)
Raji Srikantan
(1)
Randi Thomas
(1)
Raphael Chung-Wei Phan
(1)
Rebecca S. Portnoff
(1)
Robert Johnson
(4)
Ronald L. Rivest
(2)
Ryan Roggenkemper
(1)
Sakshi Jain
(1)
Samuel Rodríguez
(1)
Samuel T. King
(1)
Sanjit A. Seshia
(1)
Scott A. Crosby
(1)
Serge Egelman
(13)
Shiqi Wang
(1)
Sizhe Chen
(1)
Stark C. Draper
(1)
Stefan Lucks
(1)
Stefan Savage
(2)
Steve Hanna
(2)
Steven Chen
(1)
Steven M. Bellovin
(2)
Suman Jana
(1)
Sunny Consolvo
(1)
Supriyo Chakraborty
(1)
Susmit Jha
(1)
Tadayoshi Kohno
(1)
Tavish Vaidya
(1)
Theron Ji
(2)
Thomas R. Gross
(1)
Thurston H. Y. Dang
(2)
Tyler Close
(1)
Umesh Shankar
(2)
Vern Paxson
(4)
Vincent Rijmen
(1)
Vinod M. Prabhakaran
(1)
Vyas Sekar
(1)
Warren He
(1)
Wei Tu
(1)
Wenchao Zhou
(1)
William Millan
(1)
Won Park
(1)
Xiaojing Liao
(1)
Xue Cong Li
(1)
Xuqing Tian
(1)
Yizheng Chen
(3)
Yu-Lun Huang
(1)
Yuankai Zhang
(1)
Yue Qin
(1)
Yuval Ishai
(2)
Zeming Wei
(1)
Zhanyuan Zhang
(2)
Zhoujie Ding
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to