Biblio

Export 5 results:
Filters: Author is Benny Pinkas  [Clear All Filters]
2019
Klein A, Pinkas B.  2019.  From IP ID to Device ID and KASLR Bypass. 28th USENIX Security Symposium (USENIX Security 19). :1063--1080.
2018
Adi Y, Baum C, Cisse M, Pinkas B, Keshet J.  2018.  Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. 27th {USENIX} Security Symposium ({USENIX} Security 18). :1615--1631.
2015
Pinkas B, Schneider T, Segev G, Zohner M.  2015.  Phasing: Private Set Intersection Using Permutation-based Hashing. 24th {USENIX} Security Symposium ({USENIX} Security 15). :515--530.
2014
Pinkas B, Schneider T, Zohner M.  2014.  Faster Private Set Intersection Based on OT Extension. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :797--812.
2004
Malkhi D, Nisan N, Pinkas B, Sella Y.  2004.  Fairplay—A Secure Two-Party Computation System. 13th {USENIX} Security Symposium ({USENIX} Security 04).