IEEE Symposium on Security and Privacy

Videos from IEEE Symposium on Security and Privacy

Page 1 of 1 • 14 total videos

Evaluating the Sufficiency of Cryptographic Deniability: Non-Expert Perspectives on Secure Messaging
15:37

Evaluating the Sufficiency of Cryptographic Deniability: Non-Expert Perspectives on Secure Messaging

IEEE Symposium on Security and Privacy
348 views
Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques
1:00

Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques

IEEE Symposium on Security and Privacy
392 views
SoK: How Robust is Image Classification Deep Neural Network Watermarking
1:00

SoK: How Robust is Image Classification Deep Neural Network Watermarking

IEEE Symposium on Security and Privacy
689 views
SoK: Fully Homomorphic Encryption Compilers
15:29

SoK: Fully Homomorphic Encryption Compilers

IEEE Symposium on Security and Privacy
888 views
Adversarial Watermarking Transformer: Enhancing Text Provenance Tracking through Data Hiding
16:12

Adversarial Watermarking Transformer: Enhancing Text Provenance Tracking through Data Hiding

IEEE Symposium on Security and Privacy
313 views
High-Assurance Cryptography in the Spectre Era
1:02

High-Assurance Cryptography in the Spectre Era

IEEE Symposium on Security and Privacy
250 views
Efficient Evaluation of Activation Functions over Encrypted Data
22:57

Efficient Evaluation of Activation Functions over Encrypted Data

IEEE Symposium on Security and Privacy
303 views
SoK: General Purpose Frameworks for Secure Multi-Party Computation
18:50

SoK: General Purpose Frameworks for Secure Multi-Party Computation

IEEE Symposium on Security and Privacy
2.0K views
Drones' Cryptanalysis - Smashing Cryptography with a Flicker
0:54

Drones' Cryptanalysis - Smashing Cryptography with a Flicker

IEEE Symposium on Security and Privacy
182 views
Hawk: A Blockchain-Based Framework for Cryptography and Privacy-Preserving Smart Contracts
17:21

Hawk: A Blockchain-Based Framework for Cryptography and Privacy-Preserving Smart Contracts

IEEE Symposium on Security and Privacy
7.6K views
PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations
22:09

PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations

IEEE Symposium on Security and Privacy
851 views
Geppetto: Versatile Verifiable Computation
16:22

Geppetto: Versatile Verifiable Computation

IEEE Symposium on Security and Privacy
1.4K views
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory
18:53

Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory

IEEE Symposium on Security and Privacy
499 views
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem
17:06

Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem

IEEE Symposium on Security and Privacy
2.1K views