default search action
N. Asokan
Person information
- affiliation: University of Waterloo, ON, Canada
- affiliation: Aalto University, Department of Computer Science and Engineering
- affiliation (former): University of Helsinki, Department of Computer Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c146]Ruizhe Wang, Meng Xu, N. Asokan:
S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More. DIMVA 2024: 23-43 - [c145]Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan:
Attesting Distributional Properties of Training Data for Machine Learning. ESORICS (1) 2024: 3-23 - [c144]Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan:
Data-Oblivious ML Accelerators Using Hardware Security Extensions. HOST 2024: 373-377 - [c143]Owura Asare, Meiyappan Nagappan, N. Asokan:
A User-centered Security Evaluation of Copilot. ICSE 2024: 158:1-158:11 - [c142]Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan:
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking. NDSS 2024 - [c141]Hossam ElAtali, Xiaohe Duan, Hans Liljestrand, Meng Xu, N. Asokan:
BliMe Linter. SecDev 2024: 46-53 - [c140]Asim Waheed, Vasisht Duddu, N. Asokan:
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings. SP 2024: 2460-2477 - [c139]Vasisht Duddu, Sebastian Szyller, N. Asokan:
SoK: Unintended Interactions among Machine Learning Defenses and Risks. SP 2024: 2996-3014 - [c138]Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan:
False Claims against Model Ownership Resolution. USENIX Security Symposium 2024 - [i87]Michael Wrana, Diogo Barradas, N. Asokan:
The Spectre of Surveillance and Censorship in Future Internet Architectures. CoRR abs/2401.15828 (2024) - [i86]Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan:
Data-Oblivious ML Accelerators using Hardware Security Extensions. CoRR abs/2401.16583 (2024) - [i85]Ruizhe Wang, Meng Xu, N. Asokan:
S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More. CoRR abs/2402.01894 (2024) - [i84]Ruizhe Wang, Meng Xu, N. Asokan:
SeMalloc: Semantics-Informed Memory Allocator. CoRR abs/2402.03373 (2024) - [i83]Anudeep Das, Vasisht Duddu, Rui Zhang, N. Asokan:
Espresso: Robust Concept Filtering in Text-to-Image Models. CoRR abs/2404.19227 (2024) - [i82]Hossam ElAtali, N. Asokan:
Cancellable Memory Requests: A transparent, lightweight Spectre mitigation. CoRR abs/2406.12110 (2024) - [i81]Hossam ElAtali, Xiaohe Duan, Hans Liljestrand, Meng Xu, N. Asokan:
BliMe Linter. CoRR abs/2406.15302 (2024) - [i80]Vasisht Duddu, Oskari Järvinen, Lachlan J. Gunn, N. Asokan:
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations. CoRR abs/2406.17548 (2024) - 2023
- [j34]Owura Asare, Meiyappan Nagappan, N. Asokan:
Is GitHub's Copilot as bad as humans at introducing vulnerabilities in code? Empir. Softw. Eng. 28(6): 129 (2023) - [j33]Sebastian Szyller, Rui Zhang, Jian Liu, N. Asokan:
On the Robustness of Dataset Inference. Trans. Mach. Learn. Res. 2023 (2023) - [c137]Sebastian Szyller, N. Asokan:
Conflicting Interactions among Protection Mechanisms for Machine Learning Models. AAAI 2023: 15179-15187 - [c136]Buse G. A. Tekgul, N. Asokan:
FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks. ACSAC 2023: 492-505 - [c135]N. Asokan:
Model Stealing Attacks and Defenses: Where Are We Now? AsiaCCS 2023: 327 - [c134]Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng Yao:
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks. USENIX Security Symposium 2023: 1433-1450 - [c133]Parjanya Vyas, Asim Waheed, Yousra Aafer, N. Asokan:
Auditing Framework APIs via Inferred App-side Security Specifications. USENIX Security Symposium 2023: 6061-6077 - [i79]Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan:
False Claims against Model Ownership Resolution. CoRR abs/2304.06607 (2023) - [i78]Asim Waheed, Vasisht Duddu, N. Asokan:
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings. CoRR abs/2304.08566 (2023) - [i77]Jian Liu, Peilun Li, Raymond Cheng, N. Asokan, Dawn Song:
Parallel and Asynchronous Smart Contract Execution. CoRR abs/2306.05007 (2023) - [i76]Buse G. A. Tekgul, N. Asokan:
FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks. CoRR abs/2307.14751 (2023) - [i75]Owura Asare, Meiyappan Nagappan, N. Asokan:
Copilot Security: A User Study. CoRR abs/2308.06587 (2023) - [i74]Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan:
Attesting Distributional Properties of Training Data for Machine Learning. CoRR abs/2308.09552 (2023) - [i73]Vasisht Duddu, Sebastian Szyller, N. Asokan:
SoK: Unintended Interactions among Machine Learning Defenses and Risks. CoRR abs/2312.04542 (2023) - 2022
- [j32]Lachlan J. Gunn, N. Asokan, Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, Thomas Nyman:
Hardware Platform Security for Mobile Devices. Found. Trends Priv. Secur. 3(3-4): 214-394 (2022) - [j31]Jian Liu, Peilun Li, Raymond Cheng, N. Asokan, Dawn Song:
Parallel and Asynchronous Smart Contract Execution. IEEE Trans. Parallel Distributed Syst. 33(5): 1097-1108 (2022) - [c132]Buse Gul Atli Tekgul, N. Asokan:
On the Effectiveness of Dataset Watermarking. IWSPA@CODASPY 2022: 93-99 - [c131]Buse G. A. Tekgul, Shelly Wang, Samuel Marchal, N. Asokan:
Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses. ESORICS (3) 2022: 384-404 - [c130]Setareh Ghorshi, Lachlan J. Gunn, Hans Liljestrand, N. Asokan:
Towards cryptographically-authenticated in-memory data structures. SecDev 2022: 30-44 - [i72]Buse Gul Atli Tekgul, N. Asokan:
On the Effectiveness of Dataset Watermarking in Adversarial Settings. CoRR abs/2202.12506 (2022) - [i71]Hans Liljestrand, Carlos Chinea Perez, Rémi Denis-Courmont, Jan-Erik Ekberg, N. Asokan:
Color My World: Deterministic Tagging for Memory Safety. CoRR abs/2204.03781 (2022) - [i70]Owura Asare, Meiyappan Nagappan, N. Asokan:
Is GitHub's Copilot as Bad As Humans at Introducing Vulnerabilities in Code? CoRR abs/2204.04741 (2022) - [i69]Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan:
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking. CoRR abs/2204.09649 (2022) - [i68]Sebastian Szyller, N. Asokan:
Conflicting Interactions Among Protections Mechanisms for Machine Learning Models. CoRR abs/2207.01991 (2022) - [i67]Setareh Ghorshi, Lachlan J. Gunn, Hans Liljestrand, N. Asokan:
Towards cryptographically-authenticated in-memory data structures. CoRR abs/2210.11340 (2022) - [i66]Sebastian Szyller, Rui Zhang, Jian Liu, N. Asokan:
On the Robustness of Dataset Inference. CoRR abs/2210.13631 (2022) - 2021
- [j30]Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng (Daphne) Yao:
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. ACM Trans. Priv. Secur. 24(4): 26:1-26:36 (2021) - [c129]Logan Blue, Samuel Marchal, Patrick Traynor, N. Asokan:
Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices. IoTDI 2021: 15-27 - [c128]Ron Deibert, N. Asokan, Thenusha Satsoruban:
Investigating targeted espionage: Methods, findings, implications. ISTAS 2021: 1 - [c127]Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan:
DAWN: Dynamic Adversarial Watermarking of Neural Networks. ACM Multimedia 2021: 4417-4425 - [c126]Salman Ahmed, Long Cheng, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao:
Tutorial: Investigating Advanced Exploits for System Security Assurance. SecDev 2021: 3-4 - [c125]Buse G. A. Tekgul, Yuxi Xia, Samuel Marchal, N. Asokan:
WAFFLE: Watermarking in Federated Learning. SRDS 2021: 310-320 - [c124]Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, N. Asokan:
PACStack: an Authenticated Call Stack. USENIX Security Symposium 2021: 357-374 - [i65]Sebastian Szyller, Vasisht Duddu, Tommi Gröndahl, N. Asokan:
Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks. CoRR abs/2104.12623 (2021) - [i64]Buse G. A. Tekgul, Shelly Wang, Samuel Marchal, N. Asokan:
Real-time Attacks Against Deep Reinforcement Learning Policies. CoRR abs/2106.08746 (2021) - [i63]Vasisht Duddu, Sebastian Szyller, N. Asokan:
SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning. CoRR abs/2112.02230 (2021) - 2020
- [j29]Mohammad Mannan, N. Asokan:
Confronting the Limitations of Hardware-Assisted Security. IEEE Secur. Priv. 18(5): 6-7 (2020) - [j28]Tommi Gröndahl, N. Asokan:
Effective writing style transfer via combinatorial paraphrasing. Proc. Priv. Enhancing Technol. 2020(4): 175-195 (2020) - [c123]Mika Juuti, Tommi Gröndahl, Adrian Flanagan, N. Asokan:
A little goes a long way: Improving toxic language classification despite data scarcity. EMNLP (Findings) 2020: 2991-3009 - [i62]Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan:
WAFFLE: Watermarking in Federated Learning. CoRR abs/2008.07298 (2020) - [i61]Mika Juuti, Tommi Gröndahl, Adrian Flanagan, N. Asokan:
A little goes a long way: Improving toxic language classification despite data scarcity. CoRR abs/2009.12344 (2020)
2010 – 2019
- 2019
- [j27]Tommi Gröndahl, N. Asokan:
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? ACM Comput. Surv. 52(3): 45:1-45:36 (2019) - [j26]Samuel Marchal, Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan:
AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication. IEEE J. Sel. Areas Commun. 37(6): 1402-1412 (2019) - [j25]Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider:
SoK: Modular and Efficient Private Decision Tree Evaluation. Proc. Priv. Enhancing Technol. 2019(2): 187-208 (2019) - [j24]Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan:
Circumventing Cryptographic Deniability with Remote Attestation. Proc. Priv. Enhancing Technol. 2019(3): 350-369 (2019) - [j23]Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan:
Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing. IEEE Trans. Computers 68(1): 139-151 (2019) - [j22]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Sensor-Based Proximity Detection in the Face of Active Adversaries. IEEE Trans. Mob. Comput. 18(2): 444-457 (2019) - [c122]Mika Juuti, Buse Gul Atli, N. Asokan:
Making Targeted Black-box Evasion Attacks Effective and Efficient. AISec@CCS 2019: 83-94 - [c121]Fritz Alder, N. Asokan, Arseny Kurnikov, Andrew Paverd, Michael Steiner:
S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX. CCSW 2019: 185-199 - [c120]N. Asokan:
Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead. CCS 2019: 1687 - [c119]Thomas Nyman, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi:
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks. DAC 2019: 63 - [c118]Hans Liljestrand, Thomas Nyman, Jan-Erik Ekberg, N. Asokan:
Authenticated Call Stack. DAC 2019: 223 - [c117]Andrew Paverd, Marcus Völp, Ferdinand Brasser, Matthias Schunter, N. Asokan, Ahmad-Reza Sadeghi, Paulo Jorge Esteves Veríssimo, Andreas Steininger, Thorsten Holz:
Sustainable Security & Safety: Challenges and Opportunities. CERTS 2019: 4:1-4:13 - [c116]Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan:
PRADA: Protecting Against DNN Model Stealing Attacks. EuroS&P 2019: 512-527 - [c115]Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Hossein Fereidooni, N. Asokan, Ahmad-Reza Sadeghi:
DÏoT: A Federated Self-learning Anomaly Detection System for IoT. ICDCS 2019: 756-767 - [c114]Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Claudio Soriente, Sasu Tarkoma, N. Asokan:
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification. PerCom 2019: 1-9 - [c113]Long Cheng, Hans Liljestrand, Md. Salman Ahmed, Thomas Nyman, Trent Jaeger, N. Asokan, Danfeng Yao:
Exploitation Techniques and Defenses for Data-Oriented Attacks. SecDev 2019: 114-128 - [c112]Hans Liljestrand, Zaheer Gauhar, Thomas Nyman, Jan-Erik Ekberg, N. Asokan:
Protecting the stack with PACed canaries. SysTEX@SOSP 2019: 4:1-4:6 - [c111]Lachlan J. Gunn, Jian Liu, Bruno Vavala, N. Asokan:
Making Speculative BFT Resilient with Trusted Monotonic Counters. SRDS 2019: 133-142 - [c110]Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan:
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. USENIX Security Symposium 2019: 177-194 - [i60]Long Cheng, Hans Liljestrand, Thomas Nyman, Yu Tsung Lee, Danfeng Yao, Trent Jaeger, N. Asokan:
Exploitation Techniques and Defenses for Data-Oriented Attacks. CoRR abs/1902.08359 (2019) - [i59]Tommi Gröndahl, N. Asokan:
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? CoRR abs/1902.08939 (2019) - [i58]Tommi Gröndahl, N. Asokan:
Using logical form encodings for unsupervised linguistic transformation: Theory and applications. CoRR abs/1902.09381 (2019) - [i57]Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, N. Asokan:
PACStack: an Authenticated Call Stack. CoRR abs/1905.10242 (2019) - [i56]Lachlan J. Gunn, Jian Liu, Bruno Vavala, N. Asokan:
Making Speculative BFT Resilient with Trusted Monotonic Counters. CoRR abs/1905.10255 (2019) - [i55]Tommi Gröndahl, N. Asokan:
Effective writing style imitation via combinatorial paraphrasing. CoRR abs/1905.13464 (2019) - [i54]Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan:
DAWN: Dynamic Adversarial Watermarking of Neural Networks. CoRR abs/1906.00830 (2019) - [i53]Mika Juuti, Buse Gul Atli, N. Asokan:
Making targeted black-box evasion attacks effective and efficient. CoRR abs/1906.03397 (2019) - [i52]Hans Liljestrand, Zaheer Gauhar, Thomas Nyman, Jan-Erik Ekberg, N. Asokan:
Protecting the stack with PACed canaries. CoRR abs/1909.05747 (2019) - [i51]Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan:
Extraction of Complex DNN Models: Real Threat or Boogeyman? CoRR abs/1910.05429 (2019) - 2018
- [j21]Markus Miettinen, N. Asokan:
Ad-hoc key agreement: A brief history and the challenges ahead. Comput. Commun. 131: 32-34 (2018) - [j20]Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan:
Toward Fairness of Cryptocurrency Payments. IEEE Secur. Priv. 16(3): 81-89 (2018) - [j19]Andrew Paverd, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Grondahl, N. Asokan, Ahmad-Reza Sadeghi:
OmniShare: Encrypted Cloud Storage for the Multi-Device Era. IEEE Internet Comput. 22(4): 27-36 (2018) - [j18]Elena Reshetova, Hans Liljestrand, Andrew Paverd, N. Asokan:
Toward Linux kernel memory safety. Softw. Pract. Exp. 48(12): 2237-2256 (2018) - [j17]N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(11): 2290-2300 (2018) - [c109]Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. ARES 2018: 40:1-40:10 - [c108]Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan:
All You Need is: Evading Hate Speech Detection. AISec@CCS 2018: 2-12 - [c107]Jian Liu, Li Duan, Yong Li, N. Asokan:
Secure Deduplication of Encrypted Data: Refined Model and New Constructions. CT-RSA 2018: 374-393 - [c106]Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan:
Revisiting context-based authentication in IoT. DAC 2018: 32:1-32:6 - [c105]Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan:
Migrating SGX Enclaves with Persistent State. DSN 2018: 195-206 - [c104]Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan:
Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews. ESORICS (1) 2018: 132-151 - [c103]Christian Vaas, Mika Juuti, N. Asokan, Ivan Martinovic:
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories. EuroS&P 2018: 199-213 - [c102]Md Sakib Nizam Khan, Samuel Marchal, Sonja Buchegger, N. Asokan:
chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change. Privacy and Identity Management 2018: 205-221 - [c101]Samuel Marchal, N. Asokan:
On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World. CSET @ USENIX Security Symposium 2018 - [c100]Arseny Kurnikov, Klaudia Krawiecka, Andrew Paverd, Mohammad Mannan, N. Asokan:
Using SafeKeeper to Protect Web Passwords. WWW (Companion Volume) 2018: 159-162 - [c99]Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
SafeKeeper: Protecting Web Passwords using Trusted Execution Environments. WWW 2018: 349-358 - [i50]Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Sasu Tarkoma, N. Asokan:
Proximity Verification Based on Acoustic Room Impulse Response. CoRR abs/1803.07211 (2018) - [i49]Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan:
Migrating SGX Enclaves with Persistent State. CoRR abs/1803.11021 (2018) - [i48]Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Minh Hoang Dang, N. Asokan, Ahmad-Reza Sadeghi:
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices. CoRR abs/1804.07474 (2018) - [i47]Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. CoRR abs/1804.08569 (2018) - [i46]Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan:
Stay On-Topic: Generating Context-specific Fake Restaurant Reviews. CoRR abs/1805.02400 (2018) - [i45]Mika Juuti, Sebastian Szyller, Alexey Dmitrenko, Samuel Marchal, N. Asokan:
PRADA: Protecting against DNN Model Stealing Attacks. CoRR abs/1805.02628 (2018) - [i44]N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. CoRR abs/1807.05002 (2018) - [i43]Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan:
All You Need is "Love": Evading Hate-speech Detection. CoRR abs/1808.09115 (2018) - [i42]Fritz Alder, N. Asokan, Arseny Kurnikov, Andrew Paverd, Michael Steiner:
S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX. CoRR abs/1810.06080 (2018) - [i41]Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan:
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. CoRR abs/1811.09189 (2018) - [i40]Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan:
On The Use of Remote Attestation to Break and Repair Deniability. IACR Cryptol. ePrint Arch. 2018: 424 (2018) - [i39]Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider:
SoK: Modular and Efficient Private Decision Tree Evaluation. IACR Cryptol. ePrint Arch. 2018: 1099 (2018) - 2017
- [j16]Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas:
Private Set Intersection for Unequal Set Sizes with Mobile Applications. Proc. Priv. Enhancing Technol. 2017(4): 177-197 (2017) - [j15]