Conferences

Search results

    TitleConferenceSpeaker(s)
    Panel DiscussionUSENIX Security '14
    Software Loved by its Vendors and Disliked by 70% of its Users: Two Trillion Dollars of Healthcare Information Technology's Promises and Disappointments HealthTech '14
    HealthTech '14 PanelHealthTech '14Avi Rubin, Ross Koppel, David Kotz
    Practical KleptographyWOOT '14
    Securely Connecting Wearable Health Devices to External DisplaysHealthTech '14Xiaohui Liang, David Kotz
    Policy, Expectations and History: Accounting of Disclosures, Patient Expectations, and What We Can Learn from the Early Days of the 1970 Fair Credit Reporting ActHealthTech '14Denise Anthony, Celeste Campos-Castillo, Ahram Lee
    Ethnography of Computer Security Evasions in Healthcare Settings: Circumvention as the NormHealthTech '14Jim Blythe, Ross Koppel, Vijay Kothari, Sean Smith
    Decision Support for Data Segmentation (DS2): Application to Pull Architectures for HIEHealthTech '14Carl Gunter, Mike Berry, Martin French
    An Evaluation of ECG use in Cryptography for Implantable Medical Devices and Body Area NetworksHealthTech '14Michael Rushanan, Denis Foo Kune, Daniel E Holcomb, Colleen M Swanson
    Searching HIE with Differentiated Privacy PreservationHealthTech '14Yuzhe Tang, Ling Liu
    Adaptive Information Security in Body Sensor-Actuator NetworksHealthTech '14Krishna K. Venkatasubramanian, Craig A. Shue
    Privacy-Preserving Microbiome Sequencing Analysis and Storage SystemsHealthTech '14Justin Wagner, Hector Corrada-Bravo
    Differentially Private Genome Data Dissemination Through Top-Down SpecializationHealthTech '14Shuang Wang, Xiaoqian Jiang, Noman Mohammed, Rui Chen, Lucila Ohno-Machado
    "Dr. Hacker, I Presume?" An Experimentally-based Discussion about Security of Teleoperated Surgical SystemsHealthTech '14Tariq Yusuf, Tamara Bonaci, Tadayoshi Kohno, Howard Jay Chizeck
    Malware Prognosis: How to Do Malware Research in Medical DomainHealthTech '14Sai R. Gouravajhala, Amir Rahmati, Peter Honeyman, Kevin Fu
    Panel3GSE '14Mark Gondree, Chris Eagle, Portia Pusey, Timothy Leek, Giovanni Vigna, Peter Chapman
    NSF Funding Opportunities for Cybersecurity Education and Workforce Development3GSE '14Victor Piotrowski
    TRIST: Circumventing Censorship with Transcoding-Resistant Image SteganographyFOCI '14Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran
    Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful SurveillanceFOCI '14Aaron Segal, Bryan Ford, Joan Feigenbaum
    Global Network Interference Detection Over the RIPE Atlas NetworkFOCI '14Collin Anderson, Philipp Winter, Roya
    Towards a Comprehensive Picture of the Great Firewall’s DNS CensorshipFOCI '14
    Symmetric Disclosure: a Fresh Look at k-anonymityFOCI '14EJ Infeld
    Counting Packets Sent Between Arbitrary Internet HostsFOCI '14Jeffrey Knockel, Jedidiah R. Crandall
    An Internet with BRICS Characteristics: Data Sovereignty and the Balkanisation of the InternetFOCI '14Dana Polatin-Reuben, Joss Wright
    ReClaim: a Privacy-Preserving Decentralized Social NetworkFOCI '14Niels Zeilemaker, Johan Pouwelse

Pages