Raluca
Ada Popa (2022)
|
Secure
Computation in Practice
|
Ross
Anderson (2021)
|
Cryptography
and the Changing Landscape of Payment Fraud
|
Giuseppe
Ateniese (2020)
|
Is
AI taking over the world? No, but it’s making it less private.
|
Gilles
Barthe (2018)
|
Formal
Verification of Side-Channel Resistance
|
Elisa
Bertino (2024)
|
Applying
Machine Learning to Securing Cellular Networks
|
Karthikeyan
Bhargavan (2017)
|
Towards
High-Assurance Cryptographic Software |
Srdjan
Capkun (2016)
|
Securing
Positioning: From GPS to IoT
|
Ed
Dawson (2011)
|
Authorisation
Models for Dynamic Environments
|
Robert Deng (2006)
|
Inference Control and
Private Information Retrieval - Two Sides of One Tapestry
|
Srini
Devadas (2019)
|
Toward
Secure High-Performance Computer Architectures
|
Juan
Garay (2019)
|
Foundational
Aspects of Blockchain Protocols
|
Craig
Gentry (2009)
|
Fully
Homomorphic Encryption Using Ideal Lattices |
Matthew
Green (2015)
|
From
Strong Mathematics to Weak Cryptography
|
Nadia Heninger (2014)
|
How
not to Generate Random Numbers? |
Nadia
Heninger (2024)
|
Real-world
Cryptanalysis
|
Susan
Hohenberger (2022)
|
Chosen
Ciphertext Security from Injective Trapdoor Functions
|
Antoine
Joux (2009)
|
Can
We Settle Cryptography’s Hash? |
Shuichi
Katsumata (2023)
|
Challenges
and Solutions to Post-Quantum Secure Messaging
|
Angelos
Keromytis (2009)
|
Voice
over IP: Risks, Threats and Vulnerabilities |
Hugo
Krawzcyk (2008)
|
Getting
Serious about Key Derivation Functions
|
Anja
Lehmann (2021)
|
Privacy-Preserving
Authentication: Concepts, Applications, and New Advances
|
Refik
Molva (2011)
|
Privacy
in Social Networks: Can P2P Help?
|
Wenbo
Mao (2007)
|
Grid
Security from Two Levels of Virtualization
|
Victor
Miller (2008)
|
Elliptic
Curves and Cryptography: A 23 Year Perspective
|
David
Naccache (2004)
|
Exploiting
Side Information
|
Peng
Ning (2012)
|
Cloud
Computing Infrastructure Security |
Bryan Parno (2013)
|
Bootstrapping Cloud
Security |
Adrian
Perrig (2020)
|
Global
Communication Guarantees in the Presence of Adversaries
|
Michalis
Polychronakis (2023)
|
Language-enforced
Data Confidentiality against Memory Disclosure and Transient Execution
Attacks
|
Mike
Reiter (2009)
|
Better
Architectures and New Applications for Coarse Network Monitoring |
Phillip Rogaway (2014)
|
The
Emergence of Authenticated Encryption |
Avi
Rubin (2005)
|
Security
and Privacy Issues in RFID Technologies
|
Ahmad-Reza Sadeghi
(2013)
|
Selected Topics in
Mobile Security and Trusted Computing |
Nat
Sakimura (2021)
|
Digital
Being
|
George
Sherman (2005)
|
Information
Security Technologies as Enablers of Banking Systems
|
Vitaly
Shmatikov (2015)
|
All Your SSL are Belong to Us
|
Victor
Shoup (2005)
|
Sequence
of Games: A Technique for Taming Complexity in Security Proofs
|
Haya
Shulman (2018)
|
On
RPKI’s Deployment and Security of BGP
|
Sal
Stolfo (2008)
|
Insider
Threat Detection: Host and Network Monitoring Techniques
|
Francois Theberge
(2013)
|
Ensemble Clustering
for Graphs-Based Data |
Gene
Tsudik (2024)
|
APTCHAs:
What are They Good for?
|
Doug
Tygar (2017)
|
Adversarial
Machine Learning |
Bogdan
Warinschi (2016)
|
Foundations
of Hardware-Based Attested Computation and Applications of SGX
|
Hongjun
Wu (2012)
|
JH
in the NIST Hash Function Competition
|
Yiqun
Lisa Yin (2005)
|
Recent
Advances in Hash Function Research
|
Moti
Yung (2003)
|
Key-Insulated Public Key
Cryptosystems
|
Moti
Yung (2012) |
Applied
Cryptography
and Network Security - 10 years in the past and 10 years in the future |
Jianying
Zhou (2003)
|
Non-repudiation
in e-Commerce and e-Government
|