Search Results for "usenix"
Find videos related to your search query. Browse through our collection of videos matching "usenix". Search across titles, descriptions, tags, and channels to discover the content you're looking for.
Search Results for "usenix"
24 results found

12:11
USENIX Security '20 - McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers
USENIX
181 views

12:17
USENIX Security '20 - Automating the Development of Chosen Ciphertext Attacks
USENIX
272 views

30:15
USENIX Security '13 - Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer
USENIX
13.5K views

12:52
USENIX Security '23 - Security Analysis of MongoDB Queryable Encryption
USENIX
298 views

11:19
USENIX Security '23 - Automated Analysis of Protocols that use Authenticated Encryption: How...
USENIX
148 views

11:11
USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements...
USENIX
239 views

13:40
USENIX Security '24 - Cryptographic Analysis of Delta Chat
USENIX
143 views

13:16
USENIX Security '22 - Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality
USENIX
423 views

11:47
USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test
USENIX
289 views

39:33
USENIX Security '16 - Post-quantum Key Exchange—A New Hope
USENIX
468 views

12:14
USENIX Security '22 - Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker,
USENIX
248 views

13:27
USENIX Security '24 - SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange
USENIX
165 views

29:18
USENIX Security '17 - Computer Security, Privacy, and DNA Sequencing...
USENIX
1.6K views

10:41
USENIX Security '20 - TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities...
USENIX
668 views

17:57
USENIX Security '14 - Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow
USENIX
142 views

31:33
USENIX Security '15 - To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections
USENIX
32 views

12:32
USENIX Security '21 - Are Privacy Dashboards Good for End Users? Evaluating User Perceptions...
USENIX
162 views

11:15
USENIX Security '20 - Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks
USENIX
817 views

11:23
USENIX Security '21 - A Large-Scale Interview Study on Information Security in and Attacks...
USENIX
240 views

13:49
USENIX Security '24 - K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures
USENIX
92 views

27:27
USENIX Security '18 - Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks...
USENIX
2.0K views

28:41
USENIX Security '16 - Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage
USENIX
186 views

21:55
USENIX Security '16 - The Cut-and-Choose Game and Its Application to Cryptographic Protocols
USENIX
186 views

12:25
USENIX Security '24 - The Challenges of Bringing Cryptography from Research Papers to Products:...
USENIX
148 views
Page 1