Kohno

Results: 77



#Item
41Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions Emily McReynolds, Adam Lerner, Will Scott, Franziska Roesner, and Tadayoshi Kohno Tech Policy Lab and Computer Science & Eng

Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions Emily McReynolds, Adam Lerner, Will Scott, Franziska Roesner, and Tadayoshi Kohno Tech Policy Lab and Computer Science & Eng

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-28 11:02:51
    42New Directions for Self-Destructing Data Systems Roxana Geambasu, Tadayoshi Kohno, Arvind Krishnamurthy, Amit Levy, Henry Levy University of Washington Paul Gardner

    New Directions for Self-Destructing Data Systems Roxana Geambasu, Tadayoshi Kohno, Arvind Krishnamurthy, Amit Levy, Henry Levy University of Washington Paul Gardner

    Add to Reading List

    Source URL: vanish.cs.washington.edu

    Language: English - Date: 2011-08-24 18:20:29
      43Comet: An Active Distributed Key-Value Store Roxana Geambasu Amit Levy Yoshi Kohno Arvind Krishnamurthy

      Comet: An Active Distributed Key-Value Store Roxana Geambasu Amit Levy Yoshi Kohno Arvind Krishnamurthy

      Add to Reading List

      Source URL: vanish.cs.washington.edu

      Language: English - Date: 2010-10-14 16:31:33
        44Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Yoshi Kohno Amit Levy

        Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Yoshi Kohno Amit Levy

        Add to Reading List

        Source URL: vanish.cs.washington.edu

        Language: English - Date: 2009-08-18 20:58:43
        45Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department, UC San Diego 9500 Gilman Drive, MC-0114 La Jolla, California, USA

        Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department, UC San Diego 9500 Gilman Drive, MC-0114 La Jolla, California, USA

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2002-12-02 19:59:21
        46Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Tadayoshi Kohno  Amit A. Levy

        Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Tadayoshi Kohno Amit A. Levy

        Add to Reading List

        Source URL: www.amitlevy.com

        Language: English - Date: 2012-07-22 12:12:57
        47Comet: An active distributed key-value store Roxana Geambasu, Amit A. Levy, Tadayoshi Kohno, Arvind Krishnamurthy, Henry M. Levy University of Washington Abstract Distributed key-value storage systems are widely used in

        Comet: An active distributed key-value store Roxana Geambasu, Amit A. Levy, Tadayoshi Kohno, Arvind Krishnamurthy, Henry M. Levy University of Washington Abstract Distributed key-value storage systems are widely used in

        Add to Reading List

        Source URL: www.amitlevy.com

        Language: English - Date: 2012-07-22 12:12:57
        48Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions Emily McReynolds, Adam Lerner, Will Scott, Franziska Roesner, and Tadayoshi Kohno Tech Policy Lab

        Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions Emily McReynolds, Adam Lerner, Will Scott, Franziska Roesner, and Tadayoshi Kohno Tech Policy Lab

        Add to Reading List

        Source URL: www.franziroesner.com

        Language: English - Date: 2015-04-28 14:13:03
        49This paper appears at the 33rd IEEE Symposium on Security and Privacy (OaklandUser-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems Franziska Roesner, Tadayoshi Kohno {franzi, yo

        This paper appears at the 33rd IEEE Symposium on Security and Privacy (OaklandUser-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems Franziska Roesner, Tadayoshi Kohno {franzi, yo

        Add to Reading List

        Source URL: www.franziroesner.com

        Language: English - Date: 2012-03-08 13:27:49
        50This paper appears at the 22nd USENIX Security SymposiumSecuring Embedded User Interfaces: Android and Beyond Franziska Roesner and Tadayoshi Kohno University of Washington

        This paper appears at the 22nd USENIX Security SymposiumSecuring Embedded User Interfaces: Android and Beyond Franziska Roesner and Tadayoshi Kohno University of Washington

        Add to Reading List

        Source URL: www.franziroesner.com

        Language: English - Date: 2013-11-25 19:45:09