USENIX Security '22 - Private Signaling

USENIX Security '22 - Private SignalingПодробнее

USENIX Security '22 - Private Signaling

USENIX Security '22 - Lend Me Your Ear: Passive Remote Physical Side Channels on PCsПодробнее

USENIX Security '22 - Lend Me Your Ear: Passive Remote Physical Side Channels on PCs

USENIX Security '22 - Shuffle-based Private Set Union: Faster and More SecureПодробнее

USENIX Security '22 - Shuffle-based Private Set Union: Faster and More Secure

USENIX Security '22 - How and Why People Use Virtual Private NetworksПодробнее

USENIX Security '22 - How and Why People Use Virtual Private Networks

USENIX Security '22 - Batched Differentially Private Information RetrievalПодробнее

USENIX Security '22 - Batched Differentially Private Information Retrieval

USENIX Security '22 - Dos and Don'ts of Machine Learning in Computer SecurityПодробнее

USENIX Security '22 - Dos and Don'ts of Machine Learning in Computer Security

USENIX Security '22 - Practical Privacy-Preserving Authentication for SSHПодробнее

USENIX Security '22 - Practical Privacy-Preserving Authentication for SSH

USENIX Security '22 - PrivGuard: Privacy Regulation Compliance Made EasierПодробнее

USENIX Security '22 - PrivGuard: Privacy Regulation Compliance Made Easier

USENIX Security '22 - Exploring the Security Boundary of Data Reconstruction via Neuron ExclusivityПодробнее

USENIX Security '22 - Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity

USENIX Security '22 - Creating a Secure Underlay for the InternetПодробнее

USENIX Security '22 - Creating a Secure Underlay for the Internet

USENIX Security '22 - Twilight: A Differentially Private Payment Channel NetworkПодробнее

USENIX Security '22 - Twilight: A Differentially Private Payment Channel Network

USENIX Security '22 - The Dangers of Human Touch: Fingerprinting Browser Extensions through...Подробнее

USENIX Security '22 - The Dangers of Human Touch: Fingerprinting Browser Extensions through...

USENIX Security '22 - Security and Privacy Perceptions of Third-Party Application Access for GoogleПодробнее

USENIX Security '22 - Security and Privacy Perceptions of Third-Party Application Access for Google

USENIX Security '22 - ppSAT: Towards Two-Party Private SAT SolvingПодробнее

USENIX Security '22 - ppSAT: Towards Two-Party Private SAT Solving

USENIX Security '22 - Pool Inference Attacks on Local Differential Privacy...Подробнее

USENIX Security '22 - Pool Inference Attacks on Local Differential Privacy...

USENIX Security '22 - Automated Detection of Automated TrafficПодробнее

USENIX Security '22 - Automated Detection of Automated Traffic

USENIX Security '22 - Membership Inference Attacks and Defenses in Neural Network PruningПодробнее

USENIX Security '22 - Membership Inference Attacks and Defenses in Neural Network Pruning

USENIX Security '22 - How to Abuse and Fix Authenticated Encryption Without Key CommitmentПодробнее

USENIX Security '22 - How to Abuse and Fix Authenticated Encryption Without Key Commitment

USENIX Security '22 - Estimating Incidental Collection in Foreign Intelligence SurveillanceПодробнее

USENIX Security '22 - Estimating Incidental Collection in Foreign Intelligence Surveillance

События