12 - Proving UNSAT in Zero Knowledge.pdf |
|
14 - Designing Effective Masking Strategies for Dyberdefnese through human experimenation - NS.pdf |
|
14 - Designing Effective Masking Strategies for Dyberdefnese through human experimenation.pdf |
|
16 - Applying Consensus and Replication Securely with FLAQR - NS.pdf |
|
16 - Applying Consensus and Replication Securely with FLAQR.pdf |
|
17 - Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks - NS.pdf |
|
17 - Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks.pdf |
|
18 - Flawed but like Democracy we dont have a better system - NS.pdf |
|
18 - Flawed but like Democracy we dont have a better system.pdf |
|
19 - Back Propagating System Dependency Impact for Attack Investigation - NS.pdf |
|
19 - Back Propagating System Dependency Impact for Attack Investigation.pdf |
|
20 - Investigating Influencer VPN Ads on YouTube - NS.pdf |
|
20 - Investigating Influencer VPN Ads on YouTube.pdf |
|