מאמרים עם הרשאות לגישה ציבורית - Christina Garmanלמידע נוסף
זמינים באתר כלשהו: 17
Accountable privacy for decentralized anonymous payments
C Garman, M Green, I Miers
International Conference on Financial Cryptography and Data Security, 81-98, 2016
הרשאות: US National Science Foundation
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
הרשאות: US National Science Foundation
zk-creds: Flexible anonymous credentials from zksnarks and existing identity infrastructure
M Rosenberg, J White, C Garman, I Miers
2023 IEEE Symposium on Security and Privacy (SP), 790-808, 2023
הרשאות: US National Science Foundation
Dancing on the lip of the volcano: Chosen ciphertext attacks on apple imessage
C Garman, M Green, G Kaptchuk, I Miers, M Rushanan
25th {USENIX} Security Symposium ({USENIX} Security 16), 655-672, 2016
הרשאות: US National Science Foundation
Attacks Only Get Better: Password Recovery Attacks Against RC4 in {TLS}
C Garman, KG Paterson, T Van der Merwe
24th {USENIX} Security Symposium ({USENIX} Security 15), 113-128, 2015
הרשאות: UK Engineering and Physical Sciences Research Council
SoK: SGX.Fail: How Stuff Gets eXposed
S van Schaik, A Seto, T Yurek, A Batori, B AlBassam, D Genkin, A Miller, ...
2024 IEEE Symposium on Security and Privacy (SP), 2024
הרשאות: US National Science Foundation, US Department of Defense, Australian …
Achieving keyless cdns with conclaves
S Herwig, C Garman, D Levin
29th {USENIX} Security Symposium ({USENIX} Security 20), 735-751, 2020
הרשאות: US National Science Foundation
Strengthening the Security of Operational Technology: Understanding Contemporary Bill of Materials
A Arora, V Wright, C Garman
JCIP The Journal of Critical Infrastructure Policy 3 (1), 111, 2022
הרשאות: US Department of Energy
Bento: Safely bringing network function virtualization to Tor
M Reininger, A Arora, S Herwig, N Francino, J Hurst, C Garman, D Levin
Proceedings of the 2021 ACM SIGCOMM 2021 Conference, 821-835, 2021
הרשאות: US National Science Foundation
Where did I leave my keys?: lessons from the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Communications of the ACM 61 (11), 148-155, 2018
הרשאות: US National Science Foundation, US Department of Defense
HACCLE: metaprogramming for secure multi-party computation
Y Bao, K Sundararajah, R Malik, Q Ye, C Wagner, N Jaber, F Wang, ...
Proceedings of the 20th ACM SIGPLAN International Conference on Generative …, 2021
הרשאות: US Department of Defense, US Office of the Director of National Intelligence
SoK: A Framework for and Analysis of Software Bill of Materials Tools
A Arora, VL Wright, C Garman
Idaho National Laboratory (INL), Idaho Falls, ID (United States), 2022
הרשאות: US Department of Energy
SNARKProbe: An Automated Security Analysis Framework for zkSNARK Implementations
Y Fan, Y Xu, C Garman
International Conference on Applied Cryptography and Network Security, 340-372, 2024
הרשאות: US National Science Foundation
Honest Majority Multi-Prover Interactive Arguments
AR Block, C Garman
Cryptology ePrint Archive, 2022
הרשאות: US National Science Foundation, US Office of the Director of National …
HACCLE: An Ecosystem for Building Secure Multi-Party Computations
Y Bao, K Sundararajah, R Malik, Q Ye, C Wagner, N Jaber, F Wang, ...
arXiv preprint arXiv:2009.01489, 2020
הרשאות: US Department of Defense, US Office of the Director of National Intelligence
Provably Avoiding Geographic Regions for Tor’s Onion Services
A Arora, R Karra, D Levin, C Garman
Financial Cryptography and Data Security, 2023
הרשאות: US National Science Foundation
Bento: Bringing Network Function Virtualization to Tor
M Reininger, A Arora, S Herwig, N Francino, C Garman, D Levin
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
הרשאות: US National Science Foundation
המידע על הפרסום ועל הגורמים המממנים נקבע באופן אוטומטי על ידי תוכנת מחשב