Conferences

Search results

    TitleConferenceSpeaker(s)
    Several Horror Stories about the Encrypted WebEnigma 2016Peter Eckersley, Yan Zhu
    The Global Conversation on EncryptionEnigma 2016Amie Stepanovich
    Social Media Self-Defense: A Guide to Stopping StalkersEnigma 2016Elle Armageddon
    Panopticlick: Fingerprinting Your Web Presence Enigma 2016Bill Budington
    Protecting High Risk UsersEnigma 2016Eva Galperin, Morgan Marquis-Boire
    Trust Beyond the First Hop—What Really Happens to Data Sent to HTTPS WebsitesEnigma 2016Nick Sullivan
    Defending, Detecting, and Responding to Hardware and Firmware AttacksEnigma 2016 Teddy Reed
    Usable Security—The Source AwakensEnigma 2016Matthew Smith
    Security and Usability from the Frontlines of Enterprise ITEnigma 2016Jon Oberheide
    Why Is Usable Security Hard, and What Should We Do about It?Enigma 2016Adrienne Porter Felt
    Lessons Learned While Protecting GmailEnigma 2016Elie Bursztein
    From Concept to Deployment—The Life (and Death) of Security FeaturesEnigma 2016Glenn Wurster
    Server-side Second Factors: A Statistical Approach to Measuring User AuthenticityEnigma 2016David Freeman
    Building a DDoS Mitigation PipelineEnigma 2016Marek Majkowski
    PKI at Scale Using Short­-lived CertificatesEnigma 2016Bryan Payne
    Computer Security and the Internet of ThingsEnigma 2016Tadayoshi Kohno
    Modern Automotive Vulnerabilities: Causes, Disclosures, and OutcomesEnigma 2016Stefan Savage
    Data Integrity Based Attacks in Investigative Domains: How Companies Are Exploiting Data Science to Thwart Investigative OutcomesEnigma 2016Eric W. D. Rozier
    Dolla Dolla Bill Y'all: Cybercrime CashoutsEnigma 2016Benjamin Brown
    Drops for Stuff: An Analysis of Reshipping Mule ScamsEnigma 2016Giovanni Vigna
    Bullet-Proof Credit Card ProcessingEnigma 2016Damon McCoy
    Hacking Health: Security in Healthcare IT SystemsEnigma 2016Avi Rubin
    Medical Device SecurityEnigma 2016Kevin Fu
    It Was Never Going to Work, So Let’s Have Some Tea (Presentation)LISA15James Mickens
    Managing and Tracking Database DeploymentsLISA15CJ Estel

Pages