Biblio

Export 2 results:
Filters: Author is Ben Smyth  [Clear All Filters]
2018
Chothia T, de Ruiter J, Smyth B.  2018.  Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. 27th USENIX Security Symposium (USENIX Security 18). :1563--1580.
2013
Smyth B, Pironti A.  2013.  Truncating TLS Connections to Violate Beliefs in Web Applications. 7th USENIX Workshop on Offensive Technologies (WOOT 13).