Music |
Video |
Movies |
Chart |
Show |
The State of the Uniform: Attacks on Encrypted Databases beyond the Uniform Query Distribution (IEEE Symposium on Security and Privacy) View |
The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution (All Hacking Cons) View |
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage (IEEE Symposium on Security and Privacy) View |
CCS 2020: Full Database Reconstruction in Two Dimensions (Lilika Markatou) View |
USENIX Security '20 - SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage (USENIX) View |
Epsolute: Efficiently Querying Databases While Providing Differential Privacy | ACM CCS 2021 (Dmytro Bogatov) View |
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN (IEEE Symposium on Security and Privacy) View |
SEVurity: No Security Without Integrity - Breaking Integrity (IEEE Symposium on Security and Privacy) View |
Flaw Label: Exploiting IPv6 Flow Label (IEEE Symposium on Security and Privacy) View |
() View |