Towards Automated Assessment of Organizational Cybersecurity Posture in CloudRoy Bar-HaimLilach Edenet al.2023CODS-COMAD 2023
Data Protection in Permissioned Blockchains using Privilege SeparationArun JosephNikita Yadavet al.2023COMSNETS 2023
Full-Stack Information Extraction System for Cybersecurity IntelligenceYoungja ParkTaesung Lee2022EMNLP 2022
Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring PrivacyLeonard DervishiXinyue Wanget al.2022AMIA Annual Symposium 2022
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through PreprocessingJonathan BootleKaoutar El Khiyaouiet al.2022ESORICS 2022
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge ProtocolsPankaj DayamaArpita Patraet al.2022PETS 2022
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association StudiesAnisa HalimiLeonard Dervishiet al.2022PETS 2022
Timing leakage analysis of non-constant-time NTT implementations with Harvey butterfliesNir DruckerTomer Pelleg2022CSCML 2022
AI-Assisted Controls Change Management for Cybersecurity in the CloudHarshal TupsamudreArun Kumaret al.2022IAAI 2022