Benjamin

Results: 8859



#Item
11Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin† Thomas S. Heydt-Benjamin†

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin† Thomas S. Heydt-Benjamin†

Add to Reading List

Source URL: www.secure-medicine.org

Language: English - Date: 2017-10-06 05:31:23
12A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗  J. Alex Halderman

A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
138  8 Esther Oswald, Benjamin Rubeli, 	 Regine Berger

8 8 Esther Oswald, Benjamin Rubeli, Regine Berger

Add to Reading List

Source URL: www.hep-verlag.ch

Language: German - Date: 2018-10-24 06:17:24
    14RobinHood: Tail Latency-Aware Caching Dynamically Reallocating from Cache-Rich to Cache-Poor Daniel S. Berger (CMU) Joint work with: Benjamin Berg (CMU), Timothy Zhu (PennState), Siddhartha Sen (Microsoft Research), Mor

    RobinHood: Tail Latency-Aware Caching Dynamically Reallocating from Cache-Rich to Cache-Poor Daniel S. Berger (CMU) Joint work with: Benjamin Berg (CMU), Timothy Zhu (PennState), Siddhartha Sen (Microsoft Research), Mor

    Add to Reading List

    Source URL: platformlab.stanford.edu

    Language: English - Date: 2018-10-15 19:25:55
    15DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work Eric Wustrow University of Colorado Boulder Benjamin VanderSloot University of Michigan

    DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work Eric Wustrow University of Colorado Boulder Benjamin VanderSloot University of Michigan

    Add to Reading List

    Source URL: benvds.com

    Language: English - Date: 2018-09-18 11:06:16
    16Resolving the conflict between generality and plausibility in verified computation Srinath Setty? , Benjamin Braun? , Victor Vu? , Andrew J. Blumberg? , Bryan Parno† , and Michael Walfish? ? The University of Texas at

    Resolving the conflict between generality and plausibility in verified computation Srinath Setty? , Benjamin Braun? , Victor Vu? , Andrew J. Blumberg? , Bryan Parno† , and Michael Walfish? ? The University of Texas at

    Add to Reading List

    Source URL: www.pepper-project.org

    Language: English - Date: 2017-11-11 14:59:54
    17An ISP-Scale Deployment of TapDance Sergey Frolov1 , Fred Douglas3 , Will Scott5 , Allison McDonald5 , Benjamin VanderSloot5 , Rod Hynes6 , Adam Kruger6 , Michalis Kallitsis4 , David G. Robinson7 , Steve Schultze2 , Niki

    An ISP-Scale Deployment of TapDance Sergey Frolov1 , Fred Douglas3 , Will Scott5 , Allison McDonald5 , Benjamin VanderSloot5 , Rod Hynes6 , Adam Kruger6 , Michalis Kallitsis4 , David G. Robinson7 , Steve Schultze2 , Niki

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
    18403 Forbidden: A Global View of CDN Geoblocking Allison McDonald University of Michigan   Benjamin VanderSloot

    403 Forbidden: A Global View of CDN Geoblocking Allison McDonald University of Michigan Benjamin VanderSloot

    Add to Reading List

    Source URL: ensa.fi

    Language: English - Date: 2018-09-24 17:21:27
    19An ISP-Scale Deployment of TapDance Sergey Frolov1 , Fred Douglas3 , Will Scott5 , Allison McDonald5 , Benjamin VanderSloot5 , Rod Hynes6 , Adam Kruger6 , Michalis Kallitsis4 , David G. Robinson7 , Steve Schultze2 , Niki

    An ISP-Scale Deployment of TapDance Sergey Frolov1 , Fred Douglas3 , Will Scott5 , Allison McDonald5 , Benjamin VanderSloot5 , Rod Hynes6 , Adam Kruger6 , Michalis Kallitsis4 , David G. Robinson7 , Steve Schultze2 , Niki

    Add to Reading List

    Source URL: benvds.com

    Language: English - Date: 2018-09-18 11:06:16
    20SoK: Cryptographically Protected Database Search Benjamin Fuller∗ , Mayank Varia† , Arkady Yerukhimovich‡ , Emily Shen‡ , Ariel Hamlin‡ , Vijay Gadepally‡ , Richard Shay‡ , John Darby Mitchell‡ , and Robe

    SoK: Cryptographically Protected Database Search Benjamin Fuller∗ , Mayank Varia† , Arkady Yerukhimovich‡ , Emily Shen‡ , Ariel Hamlin‡ , Vijay Gadepally‡ , Richard Shay‡ , John Darby Mitchell‡ , and Robe

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:01:55