Journal: IEEE Security & Privacy
Loading...
Abbreviation
IEEE secur. priv.
Publisher
IEEE
16 results
Search Results
Publications 1 - 10 of 16
- Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic?Item type: Review Article
IEEE Security & PrivacyGugelmann, David; Studerus, Pascal; Lenders, Vincent; et al. (2015) - Analyzing Cryptography in the Wild: A RetrospectiveItem type: Journal Article
IEEE Security & PrivacyAlbrecht, Martin R.; Paterson, Kenneth G. (2024)We reflect on our experiences analyzing cryptography deployed "in the wild" and give recommendations to fellow researchers about this process. - On Secure Data DeletionItem type: Journal Article
IEEE Security & PrivacyReardon, Joel; Basin, David; Capkun, Srdjan (2014) - Is Bitcoin a Decentralized Currency?Item type: Journal Article
IEEE Security & PrivacyGervais, Arthur; Karame, Ghassan O.; Capkun, Vedran; et al. (2014) - End-to-End Encrypted Cloud StorageItem type: Journal Article
IEEE Security & PrivacyBackendal, Matilda; Haller, Miro; Paterson, Kenny (2024)End-to-end encryption is rapidly becoming the accepted security goal for personal data. In this article, we examine consumer cloud storage systems, focusing in particular on those systems that attempt to provide end-to-end security for customer data. We survey the security guarantees of current service providers and the issues they face, discuss open research questions, and highlight the challenges that impede the deployment of end-to-end secure cloud storage. - Usage control enforcement - Present and futureItem type: Journal Article
IEEE Security & PrivacyPretschner, Alexander; Hilty, Manuel; Schuetz, Florian; et al. (2008) - Tamarin: Verification of Large-Scale, Real-World, Cryptographic ProtocolsItem type: Journal Article
IEEE Security & PrivacyBasin, David; Cremers, Cas; Dreier, Jannik; et al. (2022)Tamarin is a mature, state-of-the-art tool for cryptographic protocol verification. We survey some of the larger tour de force results achieved and show how Tamarin can formalize protocols, adversary models, and properties, and scale to substantial, real world, verification problems. - Are We Really Close? Verifying Proximity in Wireless SystemsItem type: Journal Article
IEEE Security & PrivacyRanganathan, Aanjhan; Capkun, Srdjan (2017) - Dedicated Security Chips in the Age of Secure EnclavesItem type: Journal Article
IEEE Security & PrivacyKostiainen, Kari; Dhar, Aritra; Capkun, Srdjan (2020)Secure enclave architectures have become prevalent in modern CPUs. Enclaves provide a flexible way to implement various hardware-assisted security services. But special-purpose security chips can still have advantages. Interestingly, dedicated security chips can also assist enclaves and improve their security. - The Untapped Potential of Trusted Execution Environments on Mobile DevicesItem type: Journal Article
IEEE Security & PrivacyEkberg, Jan-Erik; Kostiainen, Kari; Asokan, N. (2014)
Publications 1 - 10 of 16