Rezultati pretraživanja
  1. 9. tra 2019.

    I am glad to share that our paper, entitled "Towards Understanding Android System Vulnerabilities: Techniques and Insights", has been accepted by . Basically we did an empirical study of 2,179 vulnerabilities on the Android Security Bulletin program over ~three years.

  2. 8. srp 2019.

    Thanks to ASIACCS'19 for the opportunity to present our work, "A Hybrid Approach to Secure Function Evaluation Using SGX," here in Auckland, NZ.

  3. 10. srp 2019.

    Awards of best papers by the one-and-only Dieter Gollmann.

  4. 9. srp 2019.

    1.1 billion handshakes later, my colleague found that over 40.5% of servers worldwide still accept some form of DES during cipher agreement. It's 2019: time to move on!

  5. 9. srp 2019.

    Beautiful evening by the harbour for conference dinner.

  6. 8. srp 2019.

    Implementing full programs (or even very large functions) via garbled circuits is costly. talks about how natural program partitions can lead to GC/SFE hybrid programs that provide speed (18-30x) AND strong security guarantees.

  7. 9. srp 2019.

    DES was deprecated a long time ago, right? shows that based on making over a billion TLS handshakes across millions of servers, over 40% of TLS servers are still supporting a variant of DES. Great talk at .

  8. 9. srp 2019.

    Thx. My slides are available at If you need an original PPT version, pls check it at my homepage. We plan to release our dataset after finishing the on-going journal extension. Stay tuned!

  9. 9. srp 2019.

    Nice talk at by Prasanna Ravi from NTU about fault attacks in lattice sigs. Countermeasure is to perform adds in NTT domain: faults cause z rejection.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.