2008 |
4 | EE | Alexei Czeskis,
Karl Koscher,
Joshua R. Smith,
Tadayoshi Kohno:
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
ACM Conference on Computer and Communications Security 2008: 479-490 |
3 | EE | Alexei Czeskis,
David J. St. Hilaire,
Karl Koscher,
Steven D. Gribble,
Tadayoshi Kohno,
Bruce Schneier:
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
HotSec 2008 |
2 | EE | Anna Cinzia Squicciarini,
Alexei Czeskis,
Abhilasha Bhargav-Spantzel:
Privacy policies compliance across digital identity management systems.
SPRINGL 2008: 72-81 |
2006 |
1 | EE | Anna Cinzia Squicciarini,
Abhilasha Bhargav-Spantzel,
Alexei Czeskis,
Elisa Bertino:
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Privacy Enhancing Technologies 2006: 78-98 |