What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Angelos D. Keromytis
Google Scholar
95
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/acns
Harnessing the Power of General-Purpose LLMs in Hardware Trojan Design.
Georgios Kokolakis
Athanasios Moschos
Angelos D. Keromytis
2024
conf/host
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans.
Athanasios Moschos
Fabian Monrose
Angelos D. Keromytis
2024
conf/ndss
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials.
Hexuan Yu
Changlai Du
Yang Xiao
Angelos D. Keromytis
Chonggang Wang
Robert Gazda
Y. Thomas Hou
Wenjing Lou
2023
conf/uss
UCBlocker: Unwanted Call Blocking Using Anonymous Authentication.
Changlai Du
Hexuan Yu
Yang Xiao
Y. Thomas Hou
Angelos D. Keromytis
Wenjing Lou
2023
conf/uss
Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators.
Athanasios Avgetidis
Omar Alrawi
Kevin Valakuzhy
Charles Lever
Paul Burbage
Angelos D. Keromytis
Fabian Monrose
Manos Antonakakis
2022
conf/ccs
HammerScope: Observing DRAM Power Consumption Using Rowhammer.
Yaakov Cohen
Kevin Sam Tharayil
Arie Haenel
Daniel Genkin
Angelos D. Keromytis
Yossi Oren
Yuval Yarom
2022
conf/acsac
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy.
Aaron Faulkenberry
Athanasios Avgetidis
Zane Ma
Omar Alrawi
Charles Lever
Panagiotis Kintis
Fabian Monrose
Angelos D. Keromytis
Manos Antonakakis
2017
conf/ccs
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities.
Theofilos Petsios
Jason Zhao
Angelos D. Keromytis
Suman Jana
2017
conf/sp
HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations.
Suphannee Sivakorn
George Argyros
Kexin Pei
Angelos D. Keromytis
Suman Jana
2017
conf/sp
NEZHA: Efficient Domain-Independent Differential Testing.
Theofilos Petsios
Adrian Tang
Salvatore J. Stolfo
Angelos D. Keromytis
Suman Jana
2016
conf/ccs
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.
George Argyros
Ioannis Stais
Suman Jana
Angelos D. Keromytis
Aggelos Kiayias
2016
conf/ccs
Protecting Insecure Communications with Topology-aware Network Tunnels.
Georgios Kontaxis
Angelos D. Keromytis
2016
conf/sp
Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters.
George Argyros
Ioannis Stais
Aggelos Kiayias
Angelos D. Keromytis
2016
conf/sp
The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information.
Suphannee Sivakorn
Iasonas Polakis
Angelos D. Keromytis
2016
conf/eurosp
I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs.
Suphannee Sivakorn
Iasonas Polakis
Angelos D. Keromytis
2016
conf/esorics
NaClDroid: Native Code Isolation for Android Applications.
Elias Athanasopoulos
Vasileios P. Kemerlis
Georgios Portokalidis
Angelos D. Keromytis
2015
conf/ccs
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications.
Yossef Oren
Vasileios P. Kemerlis
Simha Sethumadhavan
Angelos D. Keromytis
2015
conf/ccs
Where's Wally?: Precise User Discovery Attacks in Location Proximity Services.
Iasonas Polakis
George Argyros
Theofilos Petsios
Suphannee Sivakorn
Angelos D. Keromytis
2015
conf/esorics
Privacy Threats in E-Shopping (Position Paper).
Jesus Diaz
Seung Geol Choi
David Arroyo
Angelos D. Keromytis
Francisco de Borja Rodríguez
Moti Yung
2015
conf/acsac
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks.
Theofilos Petsios
Vasileios P. Kemerlis
Michalis Polychronakis
Angelos D. Keromytis
2014
conf/ccs
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication.
Iasonas Polakis
Panagiotis Ilia
Federico Maggi
Marco Lancini
Georgios Kontaxis
Stefano Zanero
Sotiris Ioannidis
Angelos D. Keromytis
2014
conf/uss
From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television.
Yossef Oren
Angelos D. Keromytis
2014
conf/uss
ret2dir: Rethinking Kernel Isolation.
Vasileios P. Kemerlis
Michalis Polychronakis
Angelos D. Keromytis
2014
conf/sp
Blind Seer: A Scalable Private DBMS.
Vasilis Pappas
Fernando Krell
Binh Vo
Vladimir Kolesnikov
Tal Malkin
Seung Geol Choi
Wesley George
Angelos D. Keromytis
Steven M. Bellovin
2014
conf/acsac
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking.
Marios Pomonis
Theofilos Petsios
Kangkook Jee
Michalis Polychronakis
Angelos D. Keromytis
2013
conf/ccs
SAuth: protecting user accounts from password database leaks.
Georgios Kontaxis
Elias Athanasopoulos
Georgios Portokalidis
Angelos D. Keromytis
2013
conf/ccs
ShadowReplica: efficient parallelization of dynamic data flow tracking.
Kangkook Jee
Vasileios P. Kemerlis
Angelos D. Keromytis
Georgios Portokalidis
2013
conf/uss
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing.
Vasilis Pappas
Michalis Polychronakis
Angelos D. Keromytis
2013
conf/esorics
CellFlood: Attacking Tor Onion Routers on the Cheap.
Marco Valerio Barbera
Vasileios P. Kemerlis
Vasilis Pappas
Angelos D. Keromytis
2012
conf/ccs
Adaptive defenses for commodity software through virtual application partitioning.
Dimitris Geneiatakis
Georgios Portokalidis
Vasileios P. Kemerlis
Angelos D. Keromytis
2012
conf/ccs
Exploiting split browsers for efficiently protecting user data.
Angeliki Zavou
Elias Athanasopoulos
Georgios Portokalidis
Angelos D. Keromytis
2012
conf/uss
kGuard: Lightweight Kernel Protection against Return-to-User Attacks.
Vasileios P. Kemerlis
Georgios Portokalidis
Angelos D. Keromytis
2012
conf/uss
Privacy-Preserving Social Plugins.
Georgios Portokalidis
Michalis Polychronakis
Angelos D. Keromytis
Evangelos P. Markatos
2012
conf/sec
Towards a Universal Data Provenance Framework Using Dynamic Instrumentation.
Eleni Gessiou
Vasilis Pappas
Elias Athanasopoulos
Angelos D. Keromytis
Sotiris Ioannidis
2012
conf/sp
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization.
Vasilis Pappas
Michalis Polychronakis
Angelos D. Keromytis
2012
conf/sp
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud.
Salvatore J. Stolfo
Malek Ben Salem
Angelos D. Keromytis
2012
conf/ndss
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
Kangkook Jee
Georgios Portokalidis
Vasileios P. Kemerlis
Soumyadeep Ghosh
David I. August
Angelos D. Keromytis
2012
conf/acsac
All your face are belong to us: breaking Facebook's social authentication.
Iasonas Polakis
Marco Lancini
Georgios Kontaxis
Federico Maggi
Sotiris Ioannidis
Angelos D. Keromytis
Stefano Zanero
2012
conf/acsac
Self-healing multitier architectures using cascading rescue points.
Angeliki Zavou
Georgios Portokalidis
Angelos D. Keromytis
2011
conf/sec
Retrofitting Security in COTS Software with Binary Rewriting.
Pádraig O'Sullivan
Kapil Anand
Aparna Kotha
Matthew Smithson
Rajeev Barua
Angelos D. Keromytis
2011
conf/fc
Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent.
Maritza L. Johnson
Steven M. Bellovin
Angelos D. Keromytis
2011
conf/acns
Misuse Detection in Consent-Based Networks.
Mansoor Alicherry
Angelos D. Keromytis
2011
conf/iciss
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS.
Dimitris Geneiatakis
Georgios Portokalidis
Angelos D. Keromytis
2011
conf/iwsec
REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points.
Georgios Portokalidis
Angelos D. Keromytis
2011
conf/iwsec
Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking.
Angeliki Zavou
Georgios Portokalidis
Angelos D. Keromytis
2010
conf/icisc
Evaluation of a Spyware Detection System Using Thin Client Computing.
Vasilis Pappas
Brian M. Bowen
Angelos D. Keromytis
2010
conf/icisc
An Adversarial Evaluation of Network Signaling and Control Mechanisms.
Kangkook Jee
Stelios Sidiroglou-Douskos
Angelos Stavrou
Angelos D. Keromytis
2010
conf/esorics
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation.
Sambuddho Chakravarty
Angelos Stavrou
Angelos D. Keromytis
2010
conf/iwsec
Securing MANET Multicast Using DIPLOMA.
Mansoor Alicherry
Angelos D. Keromytis
2010
conf/acsac
Fast and practical instruction-set randomization for commodity systems.
Georgios Portokalidis
Angelos D. Keromytis
2010
conf/wisec
Automating the injection of believable decoys to detect snooping.
Brian M. Bowen
Vasileios P. Kemerlis
Pratap V. Prabhu
Angelos D. Keromytis
Salvatore J. Stolfo
2009
conf/iciss
A Survey of Voice over IP Security Research.
Angelos D. Keromytis
2009
conf/iciss
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs.
Vanessa Frías-Martínez
Salvatore J. Stolfo
Angelos D. Keromytis
2009
conf/ndss
Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic.
Yingbo Song
Angelos D. Keromytis
Salvatore J. Stolfo
2009
conf/acsac
A Network Access Control Mechanism Based on Behavior Profiles.
Vanessa Frías-Martínez
Joseph Sherrick
Salvatore J. Stolfo
Angelos D. Keromytis
2008
conf/ccs
Asynchronous policy evaluation and enforcement.
Matthew Burnside
Angelos D. Keromytis
2008
conf/acisp
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.
Debra L. Cook
Moti Yung
Angelos D. Keromytis
2008
conf/sp
Casting out Demons: Sanitizing Training Data for Anomaly Sensors.
Gabriela F. Cretu
Angelos Stavrou
Michael E. Locasto
Salvatore J. Stolfo
Angelos D. Keromytis
2008
conf/acns
Pushback for Overlay Networks: Protecting Against Malicious Insiders.
Angelos Stavrou
Michael E. Locasto
Angelos D. Keromytis
2008
conf/ndss
Taming the Devil: Techniques for Evaluating Anonymized Network Data.
Scott E. Coull
Charles V. Wright
Angelos D. Keromytis
Fabian Monrose
Michael K. Reiter
2008
conf/iwsec
Return Value Predictability Profiles for Self-healing.
Michael E. Locasto
Angelos Stavrou
Gabriela F. Cretu
Angelos D. Keromytis
Salvatore J. Stolfo
2008
conf/iwsec
Online Network Forensics for Automatic Repair Validation.
Michael E. Locasto
Matthew Burnside
Angelos D. Keromytis
2008
conf/acsac
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors.
Vanessa Frías-Martínez
Salvatore J. Stolfo
Angelos D. Keromytis
2007
conf/ccs
On the infeasibility of modeling polymorphic shellcode.
Yingbo Song
Michael E. Locasto
Angelos Stavrou
Angelos D. Keromytis
Salvatore J. Stolfo
2007
conf/ccs
Elastic block ciphers: the basic design.
Debra L. Cook
Angelos D. Keromytis
Moti Yung
2007
conf/sp
Using Rescue Points to Navigate Software Recovery.
Stelios Sidiroglou
Oren Laadan
Angelos D. Keromytis
Jason Nieh
2007
conf/acsac
SSARES: Secure Searchable Automated Remote Email Storage.
Adam J. Aviv
Michael E. Locasto
Shaya Potter
Angelos D. Keromytis
2006
conf/uss
Privacy as an Operating System Service.
Sotiris Ioannidis
Stelios Sidiroglou
Angelos D. Keromytis
2006
conf/nspw
Dark application communities.
Michael E. Locasto
Angelos Stavrou
Angelos D. Keromytis
2006
conf/acns
W3Bcrypt: Encryption as a Stylesheet.
Angelos Stavrou
Michael E. Locasto
Angelos D. Keromytis
2006
conf/ndss
Software Self-Healing Using Collaborative Application Communities.
Michael E. Locasto
Stelios Sidiroglou
Angelos D. Keromytis
2005
conf/ccs
Countering DoS attacks with stateless multipath overlays.
Angelos Stavrou
Angelos D. Keromytis
2005
conf/uss
Detecting Targeted Attacks Using Shadow Honeypots.
Kostas G. Anagnostakis
Stelios Sidiroglou
Periklis Akritidis
Konstantinos Xinidis
Evangelos P. Markatos
Angelos D. Keromytis
2005
conf/nspw
Speculative virtual verification: policy-constrained speculative execution.
Michael E. Locasto
Stelios Sidiroglou
Angelos D. Keromytis
2005
conf/ndss
MOVE: An End-to-End Solution to Network Denial of Service.
Angelos Stavrou
Angelos D. Keromytis
Jason Nieh
Vishal Misra
Dan Rubenstein
2005
conf/icics
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware.
Debra L. Cook
Ricardo A. Baratto
Angelos D. Keromytis
2005
conf/ctrsa
CryptoGraphics: Secret Key Cryptography Using Graphics Cards.
Debra L. Cook
John Ioannidis
Angelos D. Keromytis
Jake Luck
2005
conf/acsac
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing.
Gaurav S. Kc
Angelos D. Keromytis
2005
conf/acsac
Highlights from the 2005 New Security Paradigms Workshop.
Simon N. Foley
Abe Singer
Michael E. Locasto
Stelios Sidiroglou
Angelos D. Keromytis
John P. McDermott
Julie Thorpe
Paul C. van Oorschot
Anil Somayaji
Richard Ford
Mark Bush
Alex Boulatov
2004
conf/ccs
The dual receiver cryptosystem and its applications.
Theodore Diament
Homin K. Lee
Angelos D. Keromytis
Moti Yung
2004
conf/sec
Recursive Sandboxes: Extending Systrace To Empower Applications.
Aleksey Kurchuk
Angelos D. Keromytis
2004
conf/acns
A Pay-per-Use DoS Protection Mechanism for the Web.
Angelos Stavrou
John Ioannidis
Angelos D. Keromytis
Vishal Misra
Dan Rubenstein
2004
conf/acns
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap.
Michael E. Locasto
Angelos D. Keromytis
2004
conf/acns
SQLrand: Preventing SQL Injection Attacks.
Stephen W. Boyd
Angelos D. Keromytis
2004
conf/icics
Hydan: Hiding Information in Program Binaries.
Rakan El-Khalil
Angelos D. Keromytis
2003
conf/ccs
Using graphic turing tests to counter automated DDoS attacks against web servers.
William G. Morein
Angelos Stavrou
Debra L. Cook
Angelos D. Keromytis
Vishal Misra
Dan Rubenstein
2003
conf/ccs
A holistic approach to service survivability.
Angelos D. Keromytis
Janak J. Parekh
Philip Gross
Gail E. Kaiser
Vishal Misra
Jason Nieh
Dan Rubenstein
Salvatore J. Stolfo
2003
conf/ccs
Countering code-injection attacks with instruction-set randomization.
Gaurav S. Kc
Angelos D. Keromytis
Vassilis Prevelakis
2002
conf/ccs
Efficient, DoS-resistant, secure key exchange for internet protocols.
William Aiello
Steven M. Bellovin
Matt Blaze
John Ioannidis
Omer Reingold
Ran Canetti
Angelos D. Keromytis
2002
conf/fc
Fileteller: Paying and Getting Paid for File Storage.
John Ioannidis
Sotiris Ioannidis
Angelos D. Keromytis
Vassilis Prevelakis
2001
conf/fc
Offline Micropayments without Trusted Hardware.
Matt Blaze
John Ioannidis
Angelos D. Keromytis
2001
conf/ndss
Trust Management for IPsec.
Matt Blaze
John Ioannidis
Angelos D. Keromytis
2000
conf/ccs
Network security and IPsec (tutorial).
John Ioannidis
Angelos D. Keromytis
2000
conf/ccs
Implementing a distributed firewall.
Sotiris Ioannidis
Angelos D. Keromytis
Steven M. Bellovin
Jonathan M. Smith
1998
conf/ndss
Automated Recovery in a Secure Bootstrap Process.
William A. Arbaugh
Angelos D. Keromytis
David J. Farber
Jonathan M. Smith
Coauthors
Aaron Faulkenberry
(1)
Abe Singer
(1)
Adam J. Aviv
(1)
Adrian Tang
(1)
Aggelos Kiayias
(2)
Aleksey Kurchuk
(1)
Alex Boulatov
(1)
Angeliki Zavou
(3)
Angelos D. Keromytis
(95)
Angelos Stavrou
(12)
Anil Somayaji
(1)
Aparna Kotha
(1)
Arie Haenel
(1)
Athanasios Avgetidis
(2)
Athanasios Moschos
(2)
Binh Vo
(1)
Brian M. Bowen
(2)
Changlai Du
(2)
Charles Lever
(2)
Charles V. Wright
(1)
Chonggang Wang
(1)
Dan Rubenstein
(4)
Daniel Genkin
(1)
David Arroyo
(1)
David I. August
(1)
David J. Farber
(1)
Debra L. Cook
(5)
Dimitris Geneiatakis
(2)
Eleni Gessiou
(1)
Elias Athanasopoulos
(4)
Evangelos P. Markatos
(2)
Fabian Monrose
(4)
Federico Maggi
(2)
Fernando Krell
(1)
Francisco de Borja Rodríguez
(1)
Gabriela F. Cretu
(2)
Gail E. Kaiser
(1)
Gaurav S. Kc
(2)
George Argyros
(4)
Georgios Kokolakis
(1)
Georgios Kontaxis
(4)
Georgios Portokalidis
(13)
Hexuan Yu
(2)
Homin K. Lee
(1)
Iasonas Polakis
(5)
Ioannis Stais
(2)
Jake Luck
(1)
Janak J. Parekh
(1)
Jason Nieh
(3)
Jason Zhao
(1)
Jesus Diaz
(1)
John Ioannidis
(7)
John P. McDermott
(1)
Jonathan M. Smith
(2)
Joseph Sherrick
(1)
Julie Thorpe
(1)
Kangkook Jee
(4)
Kapil Anand
(1)
Kevin Sam Tharayil
(1)
Kevin Valakuzhy
(1)
Kexin Pei
(1)
Konstantinos Xinidis
(1)
Kostas G. Anagnostakis
(1)
Malek Ben Salem
(1)
Manos Antonakakis
(2)
Mansoor Alicherry
(2)
Marco Lancini
(2)
Marco Valerio Barbera
(1)
Marios Pomonis
(1)
Maritza L. Johnson
(1)
Mark Bush
(1)
Matt Blaze
(3)
Matthew Burnside
(2)
Matthew Smithson
(1)
Michael E. Locasto
(12)
Michael K. Reiter
(1)
Michalis Polychronakis
(6)
Moti Yung
(4)
Omar Alrawi
(2)
Omer Reingold
(1)
Oren Laadan
(1)
Pádraig O'Sullivan
(1)
Panagiotis Ilia
(1)
Panagiotis Kintis
(1)
Paul Burbage
(1)
Paul C. van Oorschot
(1)
Periklis Akritidis
(1)
Philip Gross
(1)
Pratap V. Prabhu
(1)
Rajeev Barua
(1)
Rakan El-Khalil
(1)
Ran Canetti
(1)
Ricardo A. Baratto
(1)
Richard Ford
(1)
Robert Gazda
(1)
Salvatore J. Stolfo
(11)
Sambuddho Chakravarty
(1)
Scott E. Coull
(1)
Seung Geol Choi
(2)
Shaya Potter
(1)
Simha Sethumadhavan
(1)
Simon N. Foley
(1)
Sotiris Ioannidis
(6)
Soumyadeep Ghosh
(1)
Stefano Zanero
(2)
Stelios Sidiroglou
(6)
Stelios Sidiroglou-Douskos
(1)
Stephen W. Boyd
(1)
Steven M. Bellovin
(4)
Suman Jana
(4)
Suphannee Sivakorn
(4)
Tal Malkin
(1)
Theodore Diament
(1)
Theofilos Petsios
(5)
Vanessa Frías-Martínez
(3)
Vasileios P. Kemerlis
(10)
Vasilis Pappas
(6)
Vassilis Prevelakis
(2)
Vishal Misra
(4)
Vladimir Kolesnikov
(1)
Wenjing Lou
(2)
Wesley George
(1)
William A. Arbaugh
(1)
William Aiello
(1)
William G. Morein
(1)
Y. Thomas Hou
(2)
Yaakov Cohen
(1)
Yang Xiao
(2)
Yingbo Song
(2)
Yossef Oren
(2)
Yossi Oren
(1)
Yuval Yarom
(1)
Zane Ma
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to