IEEE Symposium on Security and Privacy Best Papers CollectingSince 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
Vincent Cheval,Steve Kremer, Itsaka Rakotonirina
IEEE Symposium on Security and Privacy, pp.529-546, (2018)
Automated verification has become an essential part in the security evaluation of cryptographic protocols. Recently, there has been a considerable effort to lift the theory and tool support that existed for reachability properties to the more complex case of equivalence propertie...
Cited by34BibtexViews44Links
0
0
IEEE Symposium on Security and Privacy, pp.424-440, (2018)
Humanitarian action, the process of aiding individuals in situations of crises, poses unique information-security challenges due to natural or manmade disasters, the adverse environments in which it takes place, and the scale and multi-disciplinary nature of the problems. Despite...
Cited by7BibtexViews63Links
0
0
Commun. ACM, no. 2 (2017): 99-107
While security analyses of Transport Layer Security and its implementations have focused on flaws in specific cryptographic constructions, the state machines that control the flow of protocol messages have escaped scrutiny
Cited by241BibtexViews111Links
0
0
IEEE Symposium on Security and Privacy, pp.483-502, (2017)
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate design is a reaction both to the increasing demand for low-latency HTTPS connections and to a series of recent high-profile attacks on TLS. The hope is that a fresh protocol with modern cr...
Cited by76BibtexViews48Links
0
0
IACR Cryptology ePrint Archive, no. 2 (2016): 103-112
A public verifiable computation scheme allows a computationally limited client to outsource to a worker the evaluation of a function F on input u
Cited by633BibtexViews104Links
0
0
IEEE Symposium on Security and Privacy, pp.18-37, (2016)
While the move to smaller transistors has been a boon for performance it has dramatically increased the cost to fabricate chips using those smaller transistors. This forces the vast majority of chip design companies to trust a third party -- often overseas -- to fabricate their d...
Cited by136BibtexViews51Links
0
0
IEEE Symposiumon Security and Privacy, (2015)
We have presented Riposte, a new system for anonymous messaging
Cited by123BibtexViews69Links
0
0
Communications of the ACM, no. 4 (2014): 443-458
What is probably more interesting is our second idea, which in some inverts the previous one by showing an “application of the multiparty computation protocols to Bitcoin”, namely we introduce a concept of multiparty protocols that work directly on Bitcoin
Cited by256BibtexViews73Links
0
0
IEEE Symposium on Security and Privacy, pp.327-342, (2014)
With the rapid increase in cloud services collecting and using user data to offer personalized experiences, ensuring that these services comply with their privacy policies has become a business imperative for building user trust. However, most compliance efforts in industry today...
Cited by69BibtexViews46Links
0
0
IEEE Symposium on Security and Privacy, pp.128-142, (2012)
Despite a large body of work related to the security aspects of the Global System for Mobile Communications, and to a lesser extend, the Universal Mobile Telecommunications System system, there had been no scientific or other publicly available investigation of the security mecha...
Cited by42BibtexViews52Links
0
0
IEEE Symposium on Security and Privacy, pp.3-18, (2011)
Our results show that the quality of the recovered transcripts is far better in many cases than one would expect
Cited by118BibtexViews42Links
0
0
IEEE Symposium on Security and Privacy, pp.239-254, (2010)
We introduce SCiFI, a system for Secure Computation of Face Identification. The system performs face identification which compares faces of subjects with a database of registered faces. The identification is done in a secure way which protects both the privacy of the subjects and...
Cited by235BibtexViews38Links
0
0
Communications of the ACM - Amir Pnueli: Ahead of His Time, no. 1 (2009): 91-99
This paper has described Native Client, a system for incorporating untrusted x86 native code into an application that runs in a web-browser
Cited by717BibtexViews83Links
0
0
IEEE Symposium on Security and Privacy, pp.129-142, (2008)
Our investigation shows that an implantable cardioverter defibrillator is potentially susceptible to malicious attacks that violate the privacy of patient information and medical telemetry, and may experience malicious alteration to the integrity of information or state, includin...
Cited by817BibtexViews54Links
0
0