Usenix - Videos
Find videos related to your search query. Browse through our collection of videos matching "usenix". Search across titles, descriptions, tags, and channels to discover the content you're looking for.
Search Results for "usenix"
30 results found
11:19
USENIX Security '23 - Automated Analysis of Protocols that use Authenticated Encryption: How...
USENIX
148 views
17:57
USENIX Security '14 - Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow
USENIX
142 views
39:33
USENIX Security '16 - Post-quantum Key Exchange—A New Hope
USENIX
468 views
28:41
USENIX Security '16 - Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage
USENIX
186 views
11:15
USENIX Security '20 - Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks
USENIX
817 views
12:52
USENIX Security '23 - Security Analysis of MongoDB Queryable Encryption
USENIX
298 views
12:11
USENIX Security '20 - McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers
USENIX
181 views
21:55
USENIX Security '16 - The Cut-and-Choose Game and Its Application to Cryptographic Protocols
USENIX
186 views
11:23
USENIX Security '21 - A Large-Scale Interview Study on Information Security in and Attacks...
USENIX
240 views
10:41
USENIX Security '20 - TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities...
USENIX
668 views
12:32
USENIX Security '21 - Are Privacy Dashboards Good for End Users? Evaluating User Perceptions...
USENIX
162 views
13:27
USENIX Security '24 - SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange
USENIX
165 views
11:11
USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements...
USENIX
239 views
13:05
USENIX Security '22 - GAROTA: Generalized Active Root-Of-Trust Architecture
USENIX
300 views
12:17
USENIX Security '20 - Automating the Development of Chosen Ciphertext Attacks
USENIX
272 views
11:47
USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test
USENIX
289 views
22:03
USENIX Security '19 - SafeHidden: An Efficient and Secure Information Hiding Technique Using
USENIX
201 views
13:16
USENIX Security '22 - Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality
USENIX
423 views
13:49
USENIX Security '24 - K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures
USENIX
92 views
30:15
USENIX Security '13 - Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer
USENIX
13.5K views
12:25
USENIX Security '24 - The Challenges of Bringing Cryptography from Research Papers to Products:...
USENIX
148 views
29:18
USENIX Security '17 - Computer Security, Privacy, and DNA Sequencing...
USENIX
1.6K views
13:40
USENIX Security '24 - Cryptographic Analysis of Delta Chat
USENIX
143 views
31:33
USENIX Security '15 - To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections
USENIX
32 views
12:14
USENIX Security '22 - Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker,
USENIX
248 views
13:00
USENIX Security '23 - TreeSync: Authenticated Group Management for Messaging Layer Security
USENIX
514 views
15:42
USENIX Security '25 - A Formal Analysis of Apple's iMessage PQ3 Protocol
USENIX
36 views
10:39
USENIX Security '21 - The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects
USENIX
201 views
11:28
USENIX Security '23 - Formal Analysis of Session-Handling in Secure Messaging: Lifting Security...
USENIX
147 views
12:51
USENIX Security '23 - How fast do you heal? A taxonomy for post-compromise security in...
USENIX
63 views