Search for person "J. Alex Halderman"
prev
next
58 min
Tampering the Tamper-Proof
42 min
Creation and detection of IP steganography for covert…
62 min
Hot or Not: Defeating anonymity by monitoring clock skew to…
62 min
Keeping your enemies close
57 min
Vulnerabilities in the EMV Protocol
prev
next