
Beyah,Structural Data De-anonymization: Quantification, Practice, and Implications. Shouling Ji,Weiqing Li,Mudhakar Srivatsa,Raheem A.Alexey Reznichenko,Paul Francis,Private-by-Design Advertising Meets the Real World.Warren He,Devdatta Akhawe,Sumeet Jain,Elaine Shi,Dawn Xiaodong Song,ShadowCrypt: Encrypted Web Applications for Everyone.Erik-Oliver Blass,Travis Mayberry,Guevara Noubir,Kaan Onarlioglu,Toward Robust Hidden Volumes Using Write-Only Oblivious RAM.Murray,Gernot Heiser,The Last Mile: An Empirical Study of Timing Channels on seL4. Musard Balliu,Mads Dam,Roberto Guanciale,Automating Information Flow Analysis of Low Level Code.
#Autocrypt homomorphic verification
Ernst,René Just,Suzanne Millstein,Werner Dietl,Stuart Pernsteiner,Franziska Roesner,Karl Koscher,Paulo Barros Barros,Ravi Bhoraskar,Seungyeop Han,Paul Vines,Edward XueJun Wu,Collaborative Verification of Information Flow for a High-Assurance App Store. Portnoff,Kerwell Liao,Sunny Consolvo,David Wagner,Are You Ready to Lock?

Mustafa,Yan Wang,Yingying Chen,Wenyuan Xu,Marco Gruteser,Tam Vu,Detection of On-Road Vehicles Emanating GPS Interference. Muhammad Naveed,Shashank Agrawal,Manoj Prabhakaran,XiaoFeng Wang,Erman Ayday,Jean-Pierre Hubaux,Carl A.
