Articles with public access mandates - Thomas Ristenpart - US Department of DefenseLearn more
NoteFor this mandate, articles should be available from specific locations.
Not available based on mandate: 5
Beyond credential stuffing: Password similarity models using neural networks
B Pal, T Daniel, R Chatterjee, T Ristenpart
2019 IEEE Symposium on Security and Privacy (SP), 417-434, 2019
The tao of inference in privacy-protected databases
V Bindschaedler, P Grubbs, D Cash, T Ristenpart, V Shmatikov
Cryptology ePrint Archive, 2017
A new distribution-sensitive secure sketch and popularity-proportional hashing
J Woodage, R Chatterjee, Y Dodis, A Juels, T Ristenpart
Annual International Cryptology Conference, 682-710, 2017
Blind certificate authorities
L Wang, G Asharov, R Pass, T Ristenpart, A Shelat
2019 IEEE Symposium on Security and Privacy (SP), 1015-1032, 2019
Side-channel attacks on shared search indexes
L Wang, P Grubbs, J Lu, V Bindschaedler, D Cash, T Ristenpart
2017 IEEE Symposium on Security and Privacy (SP), 673-692, 2017
Available based on mandate: 3
Trauma-informed computing: Towards safer technology experiences for all
JX Chen, A McDonald, Y Zou, E Tseng, KA Roundy, A Tamersoy, ...
Proceedings of the 2022 CHI conference on human factors in computing systems …, 2022
The typtop system: Personalized typo-tolerant password checking
R Chatterjee, J Woodage, Y Pnueli, A Chowdhury, T Ristenpart
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Using program analysis to synthesize sensor spoofing attacks
I Pustogarov, T Ristenpart, V Shmatikov
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Publication and funding information is determined automatically by a computer program