The CWC Authenticated Encryption (Associated Data) Mode

John Viega , Tadayoshi Kohno , Doug Whiting

18
2003
Provably Fixing the SSH Binary Packet Protocol

Chanathip Namprempre , Mihir Bellare , Tadayoshi Kohno

5
2002
EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond

Ari Juels , Karl Koscher , Vjekoslav Brajkovic , Tadayoshi Kohno

30
2008
World-driven access control

Alexander N. Moshchuk , David A. Molnar , Franziska Roesner , Tadayoshi Kohno

11
2014
Radio frequency identification secret handshakes

Karl Koscher , Alexei Czeskis , Tadayoshi Kohno , Joshua R Smith

13
2010
Managing Access by Applications to Perceptual Information

Margus Veanes , Timothy Scott Saponas , Eyal Ofek , Alexander N. Moshchuk

6
2013
Managing Shared State Information Produced by Applications

Alexander N. Moshchuk , David A. Molnar , Franziska Roesner , Tadayoshi Kohno

20
2013
World-Driven Access Control Using Trusted Certificates

Alexander N. Moshchuk , David A. Molnar , Franziska Roesner , Tadayoshi Kohno

8
2014
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage

Kevin Fu , Seny Kamara , Tadayoshi Kohno
network and distributed system security symposium

67
2006
Privacy-preserving location tracking for devices

Thomas Ristenpart , Gabriel Maganis , Arvind Krishnamurthy , Tadayoshi Kohno

57
2008
Experiences Building Security Applications on DHTs

Henry M. Levy , Arvind Krishnamurthy , Tadayoshi Kohno , Roxana GeambasuJarret FalknerPaul Gardner

12
2009
Defeating encrypted and deniable file systems: TrueCrypt v5.1a and the case of the tattling OS and applications

Karl Koscher , Bruce Schneier , Alexei Czeskis , Steven D. Gribble
usenix security symposium 7

55
2008
10
2014
Encapsulation and decapsulation for data disintegration

Henry M. Levy , Tadayoshi Kohno , Roxana Geambasu

26
2010
Providing intent-based access to user-owned resources

Bryan J. Parno , Alexander Moshchuk , Franziska Roesner , Helen J. Wang

11
2012
Systems and methods for file access auditing

Henry Levy , Steven Gribble , Tadayoshi Kohno , Roxana Geambasu

40
2011
Privacy Scope: A Precise Information Flow Tracking System For Finding Application Leaks

David Wetherall , Jaeyeon Jung , Dawn Song , Tadayoshi Kohno

28
2009
Per-App Profiles with AppFork: The Security of Two Phones with the Convenience of One

Franziska Roesner , Earlence Fernandes , Suman Nath , Tadayoshi Kohno
Microsoft Research

2014
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

Yasuyuki Sakai , Jintai Ding , Christopher Wolf , Kun Peng
knowledge discovery and data mining 5446 ( 2)

2
2006