Search Results for "usenix"

Find videos related to your search query. Browse through our collection of videos matching "usenix". Search across titles, descriptions, tags, and channels to discover the content you're looking for.

Search Results for "usenix"

24 results found

USENIX Security '20 - McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers
12:11

USENIX Security '20 - McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers

USENIX
181 views
USENIX Security '20 - Automating the Development of Chosen Ciphertext Attacks
12:17

USENIX Security '20 - Automating the Development of Chosen Ciphertext Attacks

USENIX
272 views
USENIX Security '13 - Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer
30:15

USENIX Security '13 - Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer

USENIX
13.5K views
USENIX Security '23 - Security Analysis of MongoDB Queryable Encryption
12:52

USENIX Security '23 - Security Analysis of MongoDB Queryable Encryption

USENIX
298 views
USENIX Security '23 - Automated Analysis of Protocols that use Authenticated Encryption: How...
11:19

USENIX Security '23 - Automated Analysis of Protocols that use Authenticated Encryption: How...

USENIX
148 views
USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements...
11:11

USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements...

USENIX
239 views
USENIX Security '24 - Cryptographic Analysis of Delta Chat
13:40

USENIX Security '24 - Cryptographic Analysis of Delta Chat

USENIX
143 views
USENIX Security '22 - Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality
13:16

USENIX Security '22 - Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality

USENIX
423 views
USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test
11:47

USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test

USENIX
289 views
USENIX Security '16 - Post-quantum Key Exchange—A New Hope
39:33

USENIX Security '16 - Post-quantum Key Exchange—A New Hope

USENIX
468 views
USENIX Security '22 - Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker,
12:14

USENIX Security '22 - Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker,

USENIX
248 views
USENIX Security '24 - SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange
13:27

USENIX Security '24 - SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange

USENIX
165 views
USENIX Security '17 - Computer Security, Privacy, and DNA Sequencing...
29:18

USENIX Security '17 - Computer Security, Privacy, and DNA Sequencing...

USENIX
1.6K views
USENIX Security '20 - TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities...
10:41

USENIX Security '20 - TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities...

USENIX
668 views
USENIX Security '14 - Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow
17:57

USENIX Security '14 - Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow

USENIX
142 views
USENIX Security '15 - To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections
31:33

USENIX Security '15 - To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections

USENIX
32 views
USENIX Security '21 - Are Privacy Dashboards Good for End Users? Evaluating User Perceptions...
12:32

USENIX Security '21 - Are Privacy Dashboards Good for End Users? Evaluating User Perceptions...

USENIX
162 views
USENIX Security '20 - Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks
11:15

USENIX Security '20 - Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks

USENIX
817 views
USENIX Security '21 - A Large-Scale Interview Study on Information Security in and Attacks...
11:23

USENIX Security '21 - A Large-Scale Interview Study on Information Security in and Attacks...

USENIX
240 views
USENIX Security '24 - K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures
13:49

USENIX Security '24 - K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures

USENIX
92 views
USENIX Security '18 - Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks...
27:27

USENIX Security '18 - Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks...

USENIX
2.0K views
USENIX Security '16 - Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage
28:41

USENIX Security '16 - Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage

USENIX
186 views
USENIX Security '16 - The Cut-and-Choose Game and Its Application to Cryptographic Protocols
21:55

USENIX Security '16 - The Cut-and-Choose Game and Its Application to Cryptographic Protocols

USENIX
186 views
USENIX Security '24 - The Challenges of Bringing Cryptography from Research Papers to Products:...
12:25

USENIX Security '24 - The Challenges of Bringing Cryptography from Research Papers to Products:...

USENIX
148 views
Page 1