11 – 20 of 56
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
SGX-Bundler: speeding up enclave transitions for IO-intensive applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
2022) p.84-95(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Count Me In! Extendability for Threshold Ring Signatures
2022) 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2022 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13178. p.379-406(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure Cloud Storage with Joint Deduplication and Erasure Protection
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing
2022) 2022 IEEE International Symposium on Secure and Private Execution Environment Design p.109-120(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Chuchotage: In-line Software Network Protocol Translation for (D)TLS
2022) Proceedings of the 24th International Conference on Information and Communications Security, ICICS'22 p.589-607(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Outsourcing MPC Precomputation for Location Privacy
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2021
-
Mark
A Precise Framework for Source-Level Control-Flow Analysis
2021) IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM) p.1-11(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using Program Analysis to Identify the Use of Vulnerable Functions
2021) p.520-530(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
2021) EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding