11 – 20 of 56
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
SGX-Bundler: speeding up enclave transitions for IO-intensive applications
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Count Me In! Extendability for Threshold Ring Signatures
(2022) 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2022 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13178. p.379-406
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing
(2022) 2022 IEEE International Symposium on Secure and Private Execution Environment Design p.109-120
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
(2022) p.84-95
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Chuchotage: In-line Software Network Protocol Translation for (D)TLS
(2022) Proceedings of the 24th International Conference on Information and Communications Security, ICICS'22 p.589-607
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Outsourcing MPC Precomputation for Location Privacy
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure Cloud Storage with Joint Deduplication and Erasure Protection
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2021
-
Mark
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
(2021) EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using Program Analysis to Identify the Use of Vulnerable Functions
(2021) p.520-530
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Decentralized Dynamic PKI based on Blockchain
(2021) The 36th ACM/SIGAPP Symposium on Applied Computing, SAC '21
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
