Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited | 0 | 0.34 | 2021 |
Transparency Enhancing Technologies to Make Security Protocols Work for Humans. | 0 | 0.34 | 2019 |
VAMS: Verifiable Auditing of Access to Confidential Data. | 0 | 0.34 | 2018 |
Scanning the Internet for Liveness. | 2 | 0.39 | 2018 |
Are Payment Card Contracts Unfair? (Short Paper). | 0 | 0.34 | 2016 |
A Framework for the Game-theoretic Analysis of Censorship Resistance. | 0 | 0.34 | 2016 |
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture. | 10 | 0.50 | 2016 |
SoK: Making Sense of Censorship Resistance Systems. | 4 | 0.37 | 2016 |
Ad-Blocking and Counter Blocking: A Slice of the Arms Race. | 15 | 0.89 | 2016 |
Do You See What I See? Differential Treatment of Anonymous Users. | 12 | 0.65 | 2016 |
Insecure by Design: Protocols for Encrypted Phone Calls. | 1 | 0.35 | 2016 |
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization | 43 | 1.47 | 2015 |
Be Prepared: The EMV Preplay Attack | 1 | 0.36 | 2015 |
Security Protocols and Evidence: Where Many Payment Systems Fail. | 9 | 1.03 | 2014 |
EMV: why payment systems fail. | 9 | 0.73 | 2014 |
Quantifying and Measuring Anonymity | 2 | 0.37 | 2013 |
Towards a Theory of Application Compartmentalisation. | 0 | 0.34 | 2013 |
Might financial cryptography kill financial innovation? --- the curious case of EMV | 5 | 0.67 | 2011 |
A case study on measuring statistical data in the tor anonymity network | 34 | 1.91 | 2010 |
Chip and PIN is Broken | 36 | 2.81 | 2010 |
Impact of network topology on anonymity and overhead in low-latency anonymity networks | 6 | 0.43 | 2010 |
Failures of Tamper-Proofing in PIN Entry Devices | 3 | 0.54 | 2009 |
Optimised to Fail: Card Readers for Online Banking | 42 | 3.54 | 2009 |
Hardened stateless session cookies | 2 | 0.56 | 2008 |
Hardened stateless session cookies (transcript of discussion) | 0 | 0.34 | 2008 |
An improved clock-skew measurement technique for revealing hidden services | 38 | 1.74 | 2008 |
Metrics for Security and Performance in Low-Latency Anonymity Systems | 32 | 1.34 | 2008 |
What next after anonymity? | 0 | 0.34 | 2008 |
Sampled traffic analysis by internet-exchange-level adversaries | 92 | 3.91 | 2007 |
Securing network location awareness with authenticated DHCP. | 7 | 0.54 | 2007 |
Keep your enemies close: distance bounding against smartcard relay attacks | 103 | 7.10 | 2007 |
Hot or not: revealing hidden services by their clock skew | 78 | 5.62 | 2006 |
Ignoring the great firewall of china | 76 | 7.49 | 2006 |
Embedding covert channels into TCP/IP | 122 | 7.84 | 2005 |
Message splitting against the partial adversary | 6 | 0.87 | 2005 |
Covert channels for collusion in online computer games | 16 | 1.13 | 2004 |