IEEE Symposium on Security and Privacy

Videos from IEEE Symposium on Security and Privacy

Page 1 of 1 β€’ 15 total videos

15:37

Evaluating the Sufficiency of Cryptographic Deniability: Non-Expert Perspectives on Secure Messaging

IEEE Symposium on Security and Privacy
348 views
1:00

Why Crypto-Detectors Fail: Uncovering Flaws in Cryptographic Misuse Detection πŸ”

IEEE Symposium on Security and Privacy
392 views
1:00

SoK: How Robust is Image Classification Deep Neural Network Watermarking

IEEE Symposium on Security and Privacy
689 views
15:29

Deep Dive into Fully Homomorphic Encryption Compilers πŸ”

IEEE Symposium on Security and Privacy
888 views
16:12

Adversarial Watermarking Transformer: Enhancing Text Provenance Tracking through Data Hiding

IEEE Symposium on Security and Privacy
313 views
1:02

Securing Cryptography Against Spectre Attacks: High-Assurance Strategies πŸ”

IEEE Symposium on Security and Privacy
250 views
22:57

Efficient Evaluation of Activation Functions over Encrypted Data

IEEE Symposium on Security and Privacy
303 views
18:50

Comprehensive Review of General-Purpose Frameworks for Secure Multi-Party Computation πŸ”

IEEE Symposium on Security and Privacy
2.0K views
0:54

Drones Break Cryptography with a Simple Flicker 🚁

IEEE Symposium on Security and Privacy
182 views
1:00

Threshold ECDSA Based on ECDSA Assumptions πŸ“œ

IEEE Symposium on Security and Privacy
721 views
17:21

Hawk: A Blockchain-Based Framework for Cryptography and Privacy-Preserving Smart Contracts

IEEE Symposium on Security and Privacy
7.6K views
22:09

PhotoProof: Secure Cryptographic Authentication for Images with Flexible Transformations πŸ“Έ

IEEE Symposium on Security and Privacy
851 views
16:22

Geppetto: A Flexible Solution for Verifiable Computation πŸš€

IEEE Symposium on Security and Privacy
1.4K views
18:53

Secure Private Keys from Memory Attacks with Hardware Transactional Memory πŸ”’

IEEE Symposium on Security and Privacy
499 views
17:06

Enhancing TLS Security with Post-Quantum Key Exchange Using Ring Learning with Errors πŸ”

IEEE Symposium on Security and Privacy
2.1K views