What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Patrick Tague
Google Scholar
ORCID:
0000-0002-7561-6112
25
publications in security and cryptology related venues
Year
Venue
Title
2022
conf/wisec
On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices.
Dimitrios-Georgios Akestoridis
Vyas Sekar
Patrick Tague
2022
conf/wisec
Wireless and Mobile Security Research and Teaching in the Post-Pandemic World.
Anindya Maiti
Ahmad-Reza Sadeghi
Gabriela Felicia Ciocarlie
Patrick Tague
2021
conf/cns
HiveGuard: A Network Security Monitoring Architecture for Zigbee Networks.
Dimitrios-Georgios Akestoridis
Patrick Tague
2021
conf/cns
Hiding the Topology of an IEEE 802.15.4 Network with Limited Energy.
Sara Beatriz Schwarz
Dimitrios-Georgios Akestoridis
Patrick Tague
Hanan Hibshi
2020
conf/wisec
Zigator: analyzing the security of zigbee-enabled smart homes.
Dimitrios-Georgios Akestoridis
Madhumitha Harishankar
Michael Weber
Patrick Tague
2019
conf/wisec
Using bluetooth low energy spoofing to dispute device details: demo.
Christopher Hensler
Patrick Tague
2018
conf/sp
Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types.
Jun Han
Albert Jin Chung
Manal Kumar Sinha
Madhumitha Harishankar
Shijia Pan
Hae Young Noh
Pei Zhang
Patrick Tague
2017
conf/uss
SmartAuth: User-Centered Authorization for the Internet of Things.
Yuan Tian
Nan Zhang
Yue-Hsun Lin
XiaoFeng Wang
Blase Ur
Xianzheng Guo
Patrick Tague
2017
conf/sp
IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks.
Paul Marinescu
Chad Parry
Marjori Pomarole
Yuan Tian
Patrick Tague
Ioannis Papagiannis
2017
conf/wisec
Towards continuous and passive authentication across mobile devices: an empirical study.
Xiao Wang
Tong Yu
Ole J. Mengshoel
Patrick Tague
2016
conf/acsac
Swords and shields: a study of mobile game hacks and existing defenses.
Yuan Tian
Eric Yawei Chen
Xiaojun Ma
Shuo Chen
Xiao Wang
Patrick Tague
2015
conf/ccs
Supporting Privacy-Conscious App Update Decisions with User Reviews.
Yuan Tian
Bin Liu
Weisi Dai
Blase Ur
Patrick Tague
Lorrie Faith Cranor
2015
conf/wisec
Is your commute driving you crazy?: a study of misbehavior in vehicular platoons.
Bruce DeBruhl
Sean Weerakkody
Bruno Sinopoli
Patrick Tague
2014
conf/ccs
Non-Invasive User Tracking via Passive Sensing: Privacy Risks of Time-Series Occupancy Measurement.
Xiao Wang
Patrick Tague
2014
conf/ccs
OAuth Demystified for Mobile Application Developers.
Eric Yawei Chen
Yutong Pei
Shuo Chen
Yuan Tian
Robert Kotcher
Patrick Tague
2014
conf/ccs
A5: Automated Analysis of Adversarial Android Applications.
Timothy Vidas
Jiaqi Tan
Jay Nahata
Chaur Lih Tan
Nicolas Christin
Patrick Tague
2014
conf/sp
All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API.
Yuan Tian
Ying Chuan Liu
Amar Bhosale
Lin-Shung Huang
Patrick Tague
Collin Jackson
2014
conf/cns
JADE: Jamming-averse routing on cognitive radio mesh networks.
Yu Seung Kim
Bruce DeBruhl
Patrick Tague
2014
conf/cns
LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks.
Yu Seung Kim
Yuan Tian
Le T. Nguyen
Patrick Tague
2014
conf/wisec
Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming.
Bruce DeBruhl
Christian Kroer
Anupam Datta
Tuomas Sandholm
Patrick Tague
2013
conf/wisa
Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection.
Arjun P. Athreya
Xiao Wang
Yu Seung Kim
Yuan Tian
Patrick Tague
2013
conf/wisec
Selfish manipulation of cooperative cellular communications via channel fabrication.
Shrikant Adhikarla
Min Suk Kang
Patrick Tague
2012
conf/ccs
Carving secure wi-fi zones with defensive jamming.
Yu Seung Kim
Patrick Tague
Heejo Lee
Hyogon Kim
2012
conf/ndss
ShortMAC: Efficient Data-Plane Fault Localization.
Xin Zhang
Zongwei Zhou
Hsu-Chun Hsiao
Tiffany Hyun-Jin Kim
Adrian Perrig
Patrick Tague
2009
conf/wisec
A coding-theoretic approach for efficient message verification over insecure channels.
David Slater
Patrick Tague
Radha Poovendran
Brian J. Matt
Coauthors
Adrian Perrig
(1)
Ahmad-Reza Sadeghi
(1)
Albert Jin Chung
(1)
Amar Bhosale
(1)
Anindya Maiti
(1)
Anupam Datta
(1)
Arjun P. Athreya
(1)
Bin Liu
(1)
Blase Ur
(2)
Brian J. Matt
(1)
Bruce DeBruhl
(3)
Bruno Sinopoli
(1)
Chad Parry
(1)
Chaur Lih Tan
(1)
Christian Kroer
(1)
Christopher Hensler
(1)
Collin Jackson
(1)
David Slater
(1)
Dimitrios-Georgios Akestoridis
(4)
Eric Yawei Chen
(2)
Gabriela Felicia Ciocarlie
(1)
Hae Young Noh
(1)
Hanan Hibshi
(1)
Heejo Lee
(1)
Hsu-Chun Hsiao
(1)
Hyogon Kim
(1)
Ioannis Papagiannis
(1)
Jay Nahata
(1)
Jiaqi Tan
(1)
Jun Han
(1)
Le T. Nguyen
(1)
Lin-Shung Huang
(1)
Lorrie Faith Cranor
(1)
Madhumitha Harishankar
(2)
Manal Kumar Sinha
(1)
Marjori Pomarole
(1)
Michael Weber
(1)
Min Suk Kang
(1)
Nan Zhang
(1)
Nicolas Christin
(1)
Ole J. Mengshoel
(1)
Patrick Tague
(25)
Paul Marinescu
(1)
Pei Zhang
(1)
Radha Poovendran
(1)
Robert Kotcher
(1)
Sara Beatriz Schwarz
(1)
Sean Weerakkody
(1)
Shijia Pan
(1)
Shrikant Adhikarla
(1)
Shuo Chen
(2)
Tiffany Hyun-Jin Kim
(1)
Timothy Vidas
(1)
Tong Yu
(1)
Tuomas Sandholm
(1)
Vyas Sekar
(1)
Weisi Dai
(1)
Xianzheng Guo
(1)
Xiao Wang
(4)
XiaoFeng Wang
(1)
Xiaojun Ma
(1)
Xin Zhang
(1)
Ying Chuan Liu
(1)
Yu Seung Kim
(4)
Yuan Tian
(8)
Yue-Hsun Lin
(1)
Yutong Pei
(1)
Zongwei Zhou
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to