Biblio

Export 25 results:
Filters: Author is Tadayoshi Kohno  [Clear All Filters]
2019
Ruth K, Kohno T, Roesner F.  2019.  Secure Multi-User Content Sharing for Augmented Reality Applications. 28th USENIX Security Symposium (USENIX Security 19). :141--158.
2015
Hassanieh H, Wang J, Katabi D, Kohno T.  2015.  Securing RFIDs by Randomizing the Modulation and Channel. 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15). :235--249.
Koscher K, Kohno T, Molnar D.  2015.  SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. 9th USENIX Workshop on Offensive Technologies (WOOT 15).
2012
Roesner F, Kohno T, Wetherall D.  2012.  Detecting and Defending Against Third-Party Tracking on the Web. 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). :155--168.
2010
Geambasu R, Levy AA, Kohno T, Krishnamurthy A, Levy HM.  2010.  Comet: An Active Distributed Key-Value Store. 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10).
Neuman C, Frincke D, Fu K, Kohno T, Masera M.  2010.  Security Experimentation with Cyber-Physical Devices. 3rd Workshop on Cyber Security Experimentation and Test (CSET 10).
2008
Denning T, Fu K, Kohno T.  2008.  Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. 3rd USENIX Workshop on Hot Topics in Security (HotSec 08).
Reis C, Gribble SD, Kohno T, Weaver NC.  2008.  Detecting In-Flight Page Changes with Web Tripwires. 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 08).