Filtros de búsqueda

Lista de obras de Tadayoshi Kohno

A Review of the Security of Insulin Pump Infusion Systems

artículo científico publicado el 1 de noviembre de 2011

A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design

artículo científico publicado en 2023

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent

Breaking and provably repairing the SSH authenticated encryption scheme

artículo científico publicado en 2004

Clinically significant magnetic interference of implanted cardiac devices by portable headphones

scientific article published on 08 July 2009

Computer security for data collection technologies

artículo científico publicado en 2018

Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions

conference paper published in 2015

DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface

artículo científico publicado en 2021

Evaluation of targeted dataset collection on racial equity in face recognition

artículo científico publicado en 2023

Experimental Security Analysis of a Modern Automobile

article

Gender Biases in Tone Analysis: A Case Study of a Commercial Wearable

Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive

Herding Hash Functions and the Nostradamus Attack

article

Improving the security and privacy of implantable medical devices.

artículo científico publicado en 2010

Internet Censorship in Thailand: User Practices and Potential Threats

scholarly article published April 2017

MyTime

article published in 2016

Neurosecurity: security and privacy for neural devices

artículo científico publicado en 2009

Online Advertising in Ukraine and Russia During the 2022 Russian Invasion

artículo científico publicado en 2023

PO-631-01 TELEROBOTIC CARDIAC CATHETER ABLATION IN A RURAL HOSPITAL: A PROOF-OF-CONCEPT SIMULATION STUDY

artículo científico publicado en 2022

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

article

Privacy oracle

artículo científico publicado en 2008

Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution

artículo científico publicado en 2018

Robust Physical-World Attacks on Deep Learning Models

scholarly article published 13 September 2017

SeaGlass: Enabling City-Wide IMSI-Catcher Detection

artículo científico publicado en 2017

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

article

Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages

article

Shining Light in Dark Places: Understanding the Tor Network

The Use and Non-Use of Technology During Hurricanes

artículo científico publicado en 2023

Token-based scanning of source code for security problems

artículo científico publicado en 2002

Who's in and who's out? A case study of multimodal CLIP-filtering in DataComp

artículo científico publicado en 2024