default search action
Tadayoshi Kohno
Person information
- affiliation: University of Washington, Seattle, Washington, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Franziska Roesner, Tadayoshi Kohno:
Security and Privacy in the Metaverse. IEEE Secur. Priv. 22(1): 7-9 (2024) - [j42]Tadayoshi Kohno:
The Task Piper. IEEE Secur. Priv. 22(4): 7-12 (2024) - [j41]Rachel McAmis, Mattea Sim, Mia M. Bennett, Tadayoshi Kohno:
Over Fences and Into Yards: Privacy Threats and Concerns of Commercial Satellites. Proc. Priv. Enhancing Technol. 2024(1): 379-396 (2024) - [c125]Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, Gang Wang:
It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias. CHI 2024: 778:1-778:20 - [c124]Rachel Hong, William Agnew, Tadayoshi Kohno, Jamie Morgenstern:
Who's in and who's out? A case study of multimodal CLIP-filtering in DataComp. EAAMO 2024: 4:1-4:17 - [c123]Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes:
Experimental Analyses of the Physical Surveillance Risks in Client-Side Content Scanning. NDSS 2024 - [c122]Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, Elissa M. Redmiles:
"Violation of my body: " Perceptions of AI-generated non-consensual (intimate) imagery. SOUPS @ USENIX Security Symposium 2024: 373-392 - [c121]Kaiming Cheng, Arkaprabha Bhattacharya, Michelle Lin, Jaewook Lee, Aroosh Kumar, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner:
When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality. USENIX Security Symposium 2024 - [c120]Kabir Panahi, Shawn Robertson, Yasemin Acar, Alexandru G. Bardas, Tadayoshi Kohno, Lucy Simko:
"But they have overlooked a few things in Afghanistan: " An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections. USENIX Security Symposium 2024 - [c119]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach:
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse. USENIX Security Symposium 2024 - [c118]Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner:
SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors. USENIX Security Symposium 2024 - [i43]Ryan W. Gardner, Tadayoshi Kohno, Alec Yasinsac:
Attacking the Diebold Signature Variant - RSA Signatures with Unverified High-order Padding. CoRR abs/2403.01048 (2024) - [i42]Yuhao Wu, Franziska Roesner, Tadayoshi Kohno, Ning Zhang, Umar Iqbal:
SecGPT: An Execution Isolation Architecture for LLM-Based Systems. CoRR abs/2403.04960 (2024) - [i41]Jimin Mun, Liwei Jiang, Jenny T. Liang, Inyoung Cheong, Nicole DeCario, Yejin Choi, Tadayoshi Kohno, Maarten Sap:
Particip-AI: A Democratic Surveying Framework for Anticipating Future AI Use Cases, Harms and Benefits. CoRR abs/2403.14791 (2024) - [i40]Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner:
SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors. CoRR abs/2404.10187 (2024) - [i39]Rachel Hong, William Agnew, Tadayoshi Kohno, Jamie Morgenstern:
Who's in and who's out? A case study of multimodal CLIP-filtering in DataComp. CoRR abs/2405.08209 (2024) - [i38]Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, Elissa M. Redmiles:
"Violation of my body:" Perceptions of AI-generated non-consensual (intimate) imagery. CoRR abs/2406.05520 (2024) - [i37]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach:
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse. CoRR abs/2406.12161 (2024) - [i36]Natalie Grace Brigham, Chongjiu Gao, Tadayoshi Kohno, Franziska Roesner, Niloofar Mireshghallah:
Breaking News: Case Studies of Generative AI's Use in Journalism. CoRR abs/2406.13706 (2024) - 2023
- [j40]Tadayoshi Kohno:
{In Earth} Until (Ready). IEEE Secur. Priv. 21(2): 7-8 (2023) - [j39]Carl E. Landwehr, Michael K. Reiter, Laurie A. Williams, Gene Tsudik, Trent Jaeger, Tadayoshi Kohno, Apu Kapadia:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - [j38]Elissa M. Redmiles, Mia M. Bennett, Tadayoshi Kohno:
Power in Computer Security and Privacy: A Critical Lens. IEEE Secur. Priv. 21(2): 48-52 (2023) - [j37]Tadayoshi Kohno:
In Your Eyes. IEEE Secur. Priv. 21(5): 4-5 (2023) - [j36]Lucy Simko, Harshini Sri Ramulu, Tadayoshi Kohno, Yasemin Acar:
The Use and Non-Use of Technology During Hurricanes. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-54 (2023) - [c117]Rachel Hong, Tadayoshi Kohno, Jamie Morgenstern:
Evaluation of targeted dataset collection on racial equity in face recognition. AIES 2023: 531-541 - [c116]Pardis Emami Naeini, Joseph Breda, Wei Dai, Tadayoshi Kohno, Kim Laine, Shwetak N. Patel, Franziska Roesner:
Understanding People's Concerns and Attitudes Toward Smart Cities. CHI 2023: 71:1-71:24 - [c115]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, Kurt Thomas:
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment. CHI 2023: 190:1-190:17 - [c114]Jackson Stokes, Tal August, Robert A Marver, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, Katharina Reinecke:
How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance. CHI 2023: 617:1-617:12 - [c113]Christina Yeung, Umar Iqbal, Tadayoshi Kohno, Franziska Roesner:
Gender Biases in Tone Analysis: A Case Study of a Commercial Wearable. EAAMO 2023: 21:1-21:12 - [c112]Mattea Sim, Kurt Hugenberg, Tadayoshi Kohno, Franziska Roesner:
A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design. NSPW 2023: 102-115 - [c111]Miranda Wei, Pardis Emami Naeini, Franziska Roesner, Tadayoshi Kohno:
Skilled or Gullibleƒ Gender Stereotypes Related to Computer Security and Privacy. SP 2023: 2050-2067 - [c110]Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner:
Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality. USENIX Security Symposium 2023: 911-928 - [c109]Rachel McAmis, Tadayoshi Kohno:
The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate. USENIX Security Symposium 2023: 2169-2186 - [c108]Tadayoshi Kohno, Yasemin Acar, Wulf Loh:
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. USENIX Security Symposium 2023: 5145-5162 - [c107]Christina Yeung, Umar Iqbal, Yekaterina Tsipenyuk O'Neil, Tadayoshi Kohno, Franziska Roesner:
Online Advertising in Ukraine and Russia During the 2022 Russian Invasion. WWW 2023: 2787-2796 - [i35]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, Kurt Thomas:
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment. CoRR abs/2302.08057 (2023) - [i34]Tadayoshi Kohno, Yasemin Acar, Wulf Loh:
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. CoRR abs/2302.14326 (2023) - [i33]Inyoung Cheong, Aylin Caliskan, Tadayoshi Kohno:
Is the U.S. Legal System Ready for AI's Challenges to Human Values? CoRR abs/2308.15906 (2023) - [i32]Rock Yuren Pang, Dan Grossman, Tadayoshi Kohno, Katharina Reinecke:
The Case for Anticipating Undesirable Consequences of Computing Innovations Early, Often, and Across Computer Science. CoRR abs/2309.04456 (2023) - [i31]Umar Iqbal, Tadayoshi Kohno, Franziska Roesner:
LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins. CoRR abs/2309.10254 (2023) - 2022
- [j35]Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas:
Defensive Technology Use During the 2018-2019 Sudanese Revolution. IEEE Secur. Priv. 20(2): 40-48 (2022) - [j34]Tadayoshi Kohno:
Excerpts From the New Dictionary of Cybersecurity, 2036. IEEE Secur. Priv. 20(3): 8 (2022) - [j33]Tadayoshi Kohno:
Mx. President Has a Brain. IEEE Secur. Priv. 20(3): 9-11 (2022) - [j32]Tadayoshi Kohno, Camille Cobb, Ada Lerner, Michelle Lin, Adam Shostack:
The Buffet Overflow Café. IEEE Secur. Priv. 20(4): 4-7 (2022) - [j31]Tadayoshi Kohno:
The Schuhmacher. IEEE Secur. Priv. 20(5): 14-15 (2022) - [j30]Tadayoshi Kohno:
The Our Reality Privacy Policy. IEEE Secur. Priv. 20(6): 4-7 (2022) - [j29]Tadayoshi Kohno:
Welcome to the Latest "Off by One" Column. IEEE Secur. Priv. 20(6): 5 (2022) - [c106]Kentrell Owens, Johanna Gunawan, David R. Choffnes, Pardis Emami Naeini, Tadayoshi Kohno, Franziska Roesner:
Exploring Deceptive Design Patterns in Voice Interfaces. EuroUSEC 2022: 64-78 - [c105]Eric Zeng, Rachel McAmis, Tadayoshi Kohno, Franziska Roesner:
What factors affect targeting and bids in online advertising?: a field measurement study. IMC 2022: 210-229 - [c104]Miranda Wei, Eric Zeng, Tadayoshi Kohno, Franziska Roesner:
Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships. SOUPS @ USENIX Security Symposium 2022: 447-462 - [c103]Kentrell Owens, Anita Alem, Franziska Roesner, Tadayoshi Kohno:
Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives. USENIX Security Symposium 2022: 4077-4094 - [i30]Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes:
Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance. CoRR abs/2212.04107 (2022) - 2021
- [j28]Ivan Evtimov, Pascal Sturmfels, Tadayoshi Kohno:
FoggySight: A Scheme for Facial Lookup Privacy. Proc. Priv. Enhancing Technol. 2021(3): 204-226 (2021) - [j27]Peter Ney, Lee Organick, Jeff Nivala, Luis Ceze, Tadayoshi Kohno:
DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface. Proc. Priv. Enhancing Technol. 2021(3): 413-432 (2021) - [c102]Lucy Simko, Britnie Chin, Sungmin Na, Harkiran Kaur Saluja, Tian Qi Zhu, Tadayoshi Kohno, Alexis Hiniker, Jason C. Yip, Camille Cobb:
Would You Rather: A Focus Group Method for Eliciting and Discussing Formative Design Insights with Children. IDC 2021: 131-146 - [c101]Eric Zeng, Tadayoshi Kohno, Franziska Roesner:
What Makes a "Bad" Ad? User Perceptions of Problematic Online Advertising. CHI 2021: 361:1-361:24 - [c100]Eric Zeng, Miranda Wei, Theo Gregersen, Tadayoshi Kohno, Franziska Roesner:
Polls, clickbait, and commemorative $2 bills: problematic political advertising on news and media websites around the 2020 U.S. elections. Internet Measurement Conference 2021: 507-525 - [c99]Chunjong Park, Anas Awadalla, Tadayoshi Kohno, Shwetak N. Patel:
Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection. NeurIPS 2021: 3043-3056 - [c98]Pardis Emami Naeini, Tiona Francisco, Tadayoshi Kohno, Franziska Roesner:
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic. SOUPS @ USENIX Security Symposium 2021: 695-714 - [c97]Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas:
Defensive Technology Use by Political Activists During the Sudanese Revolution. SP 2021: 372-390 - [i29]Pardis Emami Naeini, Tiona Francisco, Tadayoshi Kohno, Franziska Roesner:
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic. CoRR abs/2106.05227 (2021) - [i28]Ivan Evtimov, Ian Covert, Aditya Kusupati, Tadayoshi Kohno:
Disrupting Model Training with Adversarial Shortcuts. CoRR abs/2106.06654 (2021) - [i27]Chunjong Park, Anas Awadalla, Tadayoshi Kohno, Shwetak N. Patel:
Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection. CoRR abs/2110.14019 (2021) - 2020
- [j26]Justin Chan, Landon P. Cox, Dean P. Foster, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham M. Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Puneet Sharma, Sudheesh Singanamalla, Jacob E. Sunshine, Stefano Tessaro:
PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing. IEEE Data Eng. Bull. 43(2): 15-35 (2020) - [j25]L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven A. Myers, Shwetak N. Patel, Joshua Streiff:
Toward a Secure Internet of Things: Directions for Research. IEEE Secur. Priv. 18(4): 28-37 (2020) - [j24]Shrirang Mare, Franziska Roesner, Tadayoshi Kohno:
Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proc. Priv. Enhancing Technol. 2020(2): 436-458 (2020) - [j23]Camille Cobb, Lucy Simko, Tadayoshi Kohno, Alexis Hiniker:
A Privacy-Focused Systematic Analysis of Online Status Indicators. Proc. Priv. Enhancing Technol. 2020(3): 384-403 (2020) - [c96]Camille Cobb, Lucy Simko, Tadayoshi Kohno, Alexis Hiniker:
User Experiences with Online Status Indicators. CHI 2020: 1-12 - [c95]Sudheesh Singanamalla, Esther Han Beol Jang, Richard J. Anderson, Tadayoshi Kohno, Kurtis Heimerl:
Accept the Risk and Continue: Measuring the Long Tail of Government https Adoption. Internet Measurement Conference 2020: 577-597 - [c94]Peter Ney, Luis Ceze, Tadayoshi Kohno:
Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference. NDSS 2020 - [i26]Justin Chan, Dean P. Foster, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham M. Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Sudheesh Singanamalla, Jacob E. Sunshine, Stefano Tessaro:
PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing. CoRR abs/2004.03544 (2020) - [i25]Lucy Simko, Ryan Calo, Franziska Roesner, Tadayoshi Kohno:
COVID-19 Contact Tracing and Privacy: Studying Opinion and Preferences. CoRR abs/2005.06056 (2020) - [i24]Ivan Evtimov, Weidong Cui, Ece Kamar, Emre Kiciman, Tadayoshi Kohno, Jerry Li:
Security and Machine Learning in the Real World. CoRR abs/2007.07205 (2020) - [i23]Kevin Fu, Tadayoshi Kohno, Daniel Lopresti, Elizabeth D. Mynatt, Klara Nahrstedt, Shwetak N. Patel, Debra J. Richardson, Benjamin G. Zorn:
Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things. CoRR abs/2008.00017 (2020) - [i22]Lucy Simko, Jack Lucas Chang, Maggie Jiang, Ryan Calo, Franziska Roesner, Tadayoshi Kohno:
COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion. CoRR abs/2012.01553 (2020) - [i21]Ivan Evtimov, Pascal Sturmfels, Tadayoshi Kohno:
FoggySight: A Scheme for Facial Lookup Privacy. CoRR abs/2012.08588 (2020)
2010 – 2019
- 2019
- [c93]Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Secure Multi-User Content Sharing for Augmented Reality Applications. USENIX Security Symposium 2019: 141-158 - [c92]Kiron Lebeck, Tadayoshi Kohno, Franziska Roesner:
Enabling Multiple Applications to Simultaneously Augment Reality: Challenges and Directions. HotMobile 2019: 81-86 - [c91]Shrirang Mare, Logan Girvin, Franziska Roesner, Tadayoshi Kohno:
Consumer Smart Homes: Where We Are and Where We Need to Go. HotMobile 2019: 117-122 - 2018
- [j22]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Arya: Operating System Support for Securely Augmenting Reality. IEEE Secur. Priv. 16(1): 44-53 (2018) - [j21]Lucy Simko, Luke Zettlemoyer, Tadayoshi Kohno:
Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution. Proc. Priv. Enhancing Technol. 2018(1): 127-144 (2018) - [c90]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Robust Physical-World Attacks on Deep Learning Visual Classification. CVPR 2018: 1625-1634 - [c89]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users. IEEE Symposium on Security and Privacy 2018: 392-408 - [c88]Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, Tadayoshi Kohno:
Computer Security and Privacy for Refugees in the United States. IEEE Symposium on Security and Privacy 2018: 409-423 - [c87]Dawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr, Atul Prakash, Tadayoshi Kohno:
Physical Adversarial Examples for Object Detectors. WOOT @ USENIX Security Symposium 2018 - [i20]Stefano Baldassi, Tadayoshi Kohno, Franziska Roesner, Moqian Tian:
Challenges and New Directions in Augmented Reality, Computer Security, and Neuroscience - Part 1: Risks to Sensation and Perception. CoRR abs/1806.10557 (2018) - [i19]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Physical Adversarial Examples for Object Detectors. CoRR abs/1807.07769 (2018) - [i18]Peter M. Ney, Luis Ceze, Tadayoshi Kohno:
Computer Security Risks of Distant Relative Matching in Consumer Genetic Databases. CoRR abs/1810.02895 (2018) - 2017
- [j20]Rajalakshmi Nandakumar, Alex Takakuwa, Tadayoshi Kohno, Shyamnath Gollakota:
CovertBand: Activity Information Leakage using Music. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(3): 87:1-87:24 (2017) - [j19]Peter Ney, Ian Smith, Gabriel Cadamuro, Tadayoshi Kohno:
SeaGlass: Enabling City-Wide IMSI-Catcher Detection. Proc. Priv. Enhancing Technol. 2017(3): 39 (2017) - [c86]Ada Lerner, Tadayoshi Kohno, Franziska Roesner:
Rewriting History: Changing the Archived Web from the Present. CCS 2017: 1741-1755 - [c85]Genevieve Gebhart, Tadayoshi Kohno:
Internet Censorship in Thailand: User Practices and Potential Threats. EuroS&P 2017: 417-432 - [c84]Anna Kornfeld Simpson, Franziska Roesner, Tadayoshi Kohno:
Securing vulnerable home IoT devices with an in-hub security manager. PerCom Workshops 2017: 551-556 - [c83]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Securing Augmented Reality Output. IEEE Symposium on Security and Privacy 2017: 320-337 - [c82]Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, Tadayoshi Kohno:
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More. USENIX Security Symposium 2017: 765-779 - [c81]Paul Vines, Franziska Roesner, Tadayoshi Kohno:
Exploring ADINT: Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob. WPES@CCS 2017: 153-164 - [c80]Camille Cobb, Tadayoshi Kohno:
How Public Is My Private Life?: Privacy in Online Dating. WWW 2017: 1231-1240 - [i17]Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, Dawn Song:
Robust Physical-World Attacks on Machine Learning Models. CoRR abs/1707.08945 (2017) - [i16]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Dawn Song, Tadayoshi Kohno, Amir Rahmati, Atul Prakash, Florian Tramèr:
Note on Attacking Object Detectors with Adversarial Stickers. CoRR abs/1712.08062 (2017) - 2016
- [j18]Miro Enev, Alex Takakuwa, Karl Koscher, Tadayoshi Kohno:
Automobile Driver Fingerprinting. Proc. Priv. Enhancing Technol. 2016(1): 34-50 (2016) - [j17]Jane Cleland-Huang, Tamara Denning, Tadayoshi Kohno, Forrest Shull, Samuel Weber:
Keeping Ahead of Our Adversaries. IEEE Softw. 33(3): 24-28 (2016) - [j16]Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner:
Excavating Web Trackers Using Web Archaeology. login Usenix Mag. 41(4) (2016) - [c79]Alexis Hiniker, Sungsoo (Ray) Hong, Tadayoshi Kohno, Julie A. Kientz:
MyTime: Designing and Evaluating an Intervention for Smartphone Non-Use. CHI 2016: 4746-4757 - [c78]Alexis Hiniker, Shwetak N. Patel, Tadayoshi Kohno, Julie A. Kientz:
Why would you do that? predicting the uses and gratifications behind smartphone-usage behaviors. UbiComp 2016: 634-645 - [c77]Camille Cobb, Samuel Sudar, Nicholas Reiter, Richard J. Anderson, Franziska Roesner, Tadayoshi Kohno:
Computer Security for Data Collection Technologies. ICTD 2016: 2 - [c76]Will Scott, Thomas E. Anderson, Tadayoshi Kohno, Arvind Krishnamurthy:
Satellite: Joint Analysis of CDNs and Network-Level Interference. USENIX ATC 2016: 195-208 - [c75]Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner:
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. USENIX Security Symposium 2016 - [c74]Kiron Lebeck, Tadayoshi Kohno, Franziska Roesner:
How to Safely Augment Reality: Challenges and Directions. HotMobile 2016: 45-50 - 2015
- [c73]Emily McReynolds, Adam Lerner, Will Scott, Franziska Roesner, Tadayoshi Kohno:
Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions. Financial Cryptography Workshops 2015: 94-111 - [c72]Tamara Bonaci, Junjie Yan, Jeffrey Herron, Tadayoshi Kohno, Howard Jay Chizeck:
Experimental analysis of denial-of-service attacks on teleoperated robotic systems. ICCPS 2015: 11-20 - [c71]Adam Lerner, Alisha Saxena, Kirk Ouimet, Ben Turley, Anthony Vance, Tadayoshi Kohno, Franziska Roesner:
Analyzing the Use of Quick Response Codes in the Wild. MobiSys 2015: 359-374 - [c70]Haitham Hassanieh, Jue Wang, Dina Katabi, Tadayoshi Kohno:
Securing RFIDs by Randomizing the Modulation and Channel. NSDI 2015: 235-249 - [c69]Karl Koscher, Tadayoshi Kohno, David Molnar:
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. WOOT 2015 - [c68]Paul Vines, Tadayoshi Kohno:
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform. WPES@CCS 2015: 75-84 - [i15]Tamara Bonaci, Jeffrey Herron, Tariq Yusuf, Junjie Yan, Tadayoshi Kohno, Howard Jay Chizeck:
To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots. CoRR abs/1504.04339 (2015) - [i14]Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:
Surreptitiously Weakening Cryptographic Systems. IACR Cryptol. ePrint Arch. 2015: 97 (2015) - 2014
- [j15]Franziska Roesner, Tadayoshi Kohno, David Molnar:
Security and privacy for augmented reality systems. Commun. ACM 57(4): 88-96 (2014) - [c67]Xinran Wang, Tadayoshi Kohno, Bob Blakley:
Polymorphism as a Defense for Automated Attack of Websites. ACNS 2014: 513-530 - [c66]Tamara Denning, Daniel B. Kramer, Batya Friedman, Matthew R. Reynolds, Brian T. Gill, Tadayoshi Kohno:
CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices. ACSAC 2014: 426-435 - [c65]Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang:
World-Driven Access Control for Continuous Sensing. CCS 2014: 1169-1181 - [c64]Tamara Denning, Zakariya Dehlawi, Tadayoshi Kohno:
In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies. CHI 2014: 2377-2386 - [c63]Franziska Roesner, Brian T. Gill, Tadayoshi Kohno:
Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages. Financial Cryptography 2014: 64-76 - [c62]Jaeyeon Jung, Tadayoshi Kohno:
Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE). UbiComp Adjunct 2014: 1279-1282 - [c61]Franziska Roesner, Tadayoshi Kohno, Tamara Denning, Ryan Calo, Bryce Clayton Newell:
Augmented reality: hard problems of law and policy. UbiComp Adjunct 2014: 1283-1288 - [c60]Tamara Denning, Adam Shostack, Tadayoshi Kohno:
Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research. 3GSE 2014 - 2013
- [j14]Tamara Denning, Tadayoshi Kohno, Henry M. Levy:
Computer security and the modern home. Commun. ACM 56(1): 94-103 (2013) - [c59]Tamara Denning, Adam Lerner, Adam Shostack, Tadayoshi Kohno:
Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education. CCS 2013: 915-928 - [c58]Loris D'Antoni, Alan M. Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franziska Roesner, T. Scott Saponas, Margus Veanes, Helen J. Wang:
Operating System Support for Augmented Reality Applications. HotOS 2013 - [c57]Temitope Oluwafemi, Tadayoshi Kohno, Sidhant Gupta, Shwetak N. Patel:
Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security. LASER 2013: 13-24 - [c56]Tamara Denning, Tadayoshi Kohno, Adam Shostack:
Control-Alt-Hack™: a card game for computer security outreach and education (abstract only). SIGCSE 2013: 729 - [c55]Franziska Roesner, Tadayoshi Kohno:
Securing Embedded User Interfaces: Android and Beyond. USENIX Security Symposium 2013: 97-112 - [c54]Alexei Czeskis, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang:
Lightweight server support for browser-based CSRF protection. WWW 2013: 273-284 - 2012
- [j13]Franziska Roesner, Christopher Rovillos, Tadayoshi Kohno, David Wetherall:
ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets. login Usenix Mag. 37(4) (2012) - [c53]Miro Enev, Jaeyeon Jung, Liefeng Bo, Xiaofeng Ren, Tadayoshi Kohno:
SensorSift: balancing sensor data privacy and utility in automated face understanding. ACSAC 2012: 149-158 - [c52]Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan S. Wallach, Dirk Balfanz:
Strengthening user authentication through opportunistic cryptographic identity assertions. CCS 2012: 404-414 - [c51]Franziska Roesner, Tadayoshi Kohno, David Wetherall:
Detecting and Defending Against Third-Party Tracking on the Web. NSDI 2012: 155-168 - [c50]Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan:
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. IEEE Symposium on Security and Privacy 2012: 224-238 - [c49]Franziska Roesner, James Fogarty, Tadayoshi Kohno:
User interface toolkit mechanisms for securing interface elements. UIST 2012: 239-250 - [c48]Nathanael Paul, Tadayoshi Kohno:
Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems. HealthSec 2012 - [c47]Tadayoshi Kohno:
Security for cyber-physical systems: case studies with medical devices, robots, and automobiles. WISEC 2012: 99-100 - [e3]Tadayoshi Kohno:
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012. USENIX Association 2012 [contents] - 2011
- [j12]Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, Geoffrey M. Voelker:
Privacy-preserving network forensics. Commun. ACM 54(5): 78-87 (2011) - [j11]David (Yu) Zhu, Jaeyeon Jung, Dawn Song, Tadayoshi Kohno, David Wetherall:
TaintEraser: protecting sensitive data leaks using application-level taint tracking. ACM SIGOPS Oper. Syst. Rev. 45(1): 142-154 (2011) - [c46]Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak N. Patel:
Televisions, video privacy, and powerline electromagnetic interference. CCS 2011: 537-550 - [c45]Roxana Geambasu, John P. John, Steven D. Gribble, Tadayoshi Kohno, Henry M. Levy:
Keypad: an auditing file system for theft-prone devices. EuroSys 2011: 1-16 - [c44]Tadayoshi Kohno, Brian David Johnson:
Science fiction prototyping and security education: cultivating contextual and societal thinking in computer security education and beyond. SIGCSE 2011: 9-14 - [c43]Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
Comprehensive Experimental Analyses of Automotive Attack Surfaces. USENIX Security Symposium 2011 - [c42]Gabriel Maganis, Jaeyeon Jung, Tadayoshi Kohno, Anmol Sheth, David Wetherall:
Sensor tricorder: what does that sensor know about me? HotMobile 2011: 98-103 - 2010
- [b2]Niels Ferguson, Bruce Schneier, Tadayoshi Kohno:
Cryptography Engineering - Design Principles and Practical Applications. Wiley 2010, ISBN 978-0-470-47424-2, pp. I-XXIX, 1-353 - [c41]David W. Richardson, Steven D. Gribble, Tadayoshi Kohno:
The limits of automatic OS fingerprint generation. AISec 2010: 24-34 - [c40]Tamara Denning, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno, William H. Maisel:
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices. CHI 2010: 917-926 - [c39]Qi Shan, Brian Curless, Tadayoshi Kohno:
Seeing through Obscure Glass. ECCV (6) 2010: 364-378 - [c38]Roxana Geambasu, Amit A. Levy, Tadayoshi Kohno, Arvind Krishnamurthy, Henry M. Levy:
Comet: An active distributed key-value store. OSDI 2010: 323-336 - [c37]Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno:
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety. SOUPS 2010 - [c36]Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak N. Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
Experimental Security Analysis of a Modern Automobile. IEEE Symposium on Security and Privacy 2010: 447-462 - [e2]Kevin Fu, Tadayoshi Kohno, Aviel D. Rubin:
1st USENIX Workshop on Health Security and Privacy, HealthSec'10, Washington, D.C., USA, August 10, 2010. USENIX Association 2010 [contents]
2000 – 2009
- 2009
- [j10]Ryan W. Gardner, Matt Bishop, Tadayoshi Kohno:
Are Patched Machines Really Fixed? IEEE Secur. Priv. 7(5): 82-85 (2009) - [c35]Karl Koscher, Ari Juels, Vjekoslav Brajkovic, Tadayoshi Kohno:
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. CCS 2009: 33-42 - [c34]Katherine Everitt, Tanya Bragin, James Fogarty, Tadayoshi Kohno:
A comprehensive study of frequency, interference, and training of multiple graphical passwords. CHI 2009: 889-898 - [c33]Tamara Denning, Cynthia Matuszek, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno:
A spotlight on security and privacy risks with future household robots: attacks and lessons. UbiComp 2009: 105-114 - [c32]Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, David Wetherall:
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default. Privacy Enhancing Technologies 2009: 143-163 - [c31]Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy:
Vanish: Increasing Data Privacy with Self-Destructing Data. USENIX Security Symposium 2009: 299-316 - 2008
- [j9]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. J. Cryptol. 21(3): 350-391 (2008) - [j8]Tadayoshi Kohno:
An Interview with RFID Security Expert Ari Juels. IEEE Pervasive Comput. 7(1): 10-11 (2008) - [j7]Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, William H. Maisel:
Security and Privacy for Implantable Medical Devices. IEEE Pervasive Comput. 7(1): 30-39 (2008) - [c30]Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno:
Privacy oracle: a system for finding application leaks with black box differential testing. CCS 2008: 279-288 - [c29]Alexei Czeskis, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno:
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. CCS 2008: 479-490 - [c28]Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall:
Improving wireless privacy with an identifier-free link layer protocol. MobiSys 2008: 40-53 - [c27]Charles Reis, Steven D. Gribble, Tadayoshi Kohno, Nicholas C. Weaver:
Detecting In-Flight Page Changes with Web Tripwires. NSDI 2008: 31-44 - [c26]Damon McCoy, Kevin S. Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker:
Shining Light in Dark Places: Understanding the Tor Network. Privacy Enhancing Technologies 2008: 63-76 - [c25]Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel:
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. SP 2008: 129-142 - [c24]Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, Bruce Schneier:
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. HotSec 2008 - [c23]Tamara Denning, Kevin Fu, Tadayoshi Kohno:
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. HotSec 2008 - [c22]Michael Piatek, Tadayoshi Kohno, Arvind Krishnamurthy:
Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice. HotSec 2008 - [c21]Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, Tadayoshi Kohno:
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs. USENIX Security Symposium 2008: 275-290 - [e1]David L. Dill, Tadayoshi Kohno:
2008 USENIX/ACCURATE Electronic Voting Workshop, EVT 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings. USENIX Association 2008 [contents] - 2007
- [j6]Travis Kriplean, Evan Welbourne, Nodira Khoussainova, Vibhor Rastogi, Magdalena Balazinska, Gaetano Borriello, Tadayoshi Kohno, Dan Suciu:
Physical Access Control for Captured RFID Data. IEEE Pervasive Comput. 6(4): 48-55 (2007) - [c20]Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang, Mike Y. Chen, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall:
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era. HotOS 2007 - [c19]T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno:
Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing. USENIX Security Symposium 2007 - [c18]Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker:
Low-resource routing attacks against tor. WPES 2007: 11-20 - 2006
- [b1]Tadayoshi Kohno:
Authenticated encryption in practice : generalized composition methods and the Secure Shell, CWC, and WinZip schemes. University of California, San Diego, USA, 2006 - [c17]Mihir Bellare, Tadayoshi Kohno, Victor Shoup:
Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. CCS 2006: 380-389 - [c16]John Kelsey, Tadayoshi Kohno:
Herding Hash Functions and the Nostradamus Attack. EUROCRYPT 2006: 183-200 - [c15]David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). S&P 2006: 365-370 - [i13]David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine. IACR Cryptol. ePrint Arch. 2006: 81 (2006) - [i12]Mihir Bellare, Tadayoshi Kohno, Victor Shoup:
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation. IACR Cryptol. ePrint Arch. 2006: 267 (2006) - [i11]Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre:
The Secure Shell (SSH) Transport Layer Encryption Modes. RFC 4344: 1-12 (2006) - 2005
- [j5]Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy:
Remote Physical Device Fingerprintin. IEEE Trans. Dependable Secur. Comput. 2(2): 93-108 (2005) - [c14]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. CRYPTO 2005: 205-222 - [c13]Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy:
Remote Physical Device Fingerprinting. S&P 2005: 211-225 - [i10]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. IACR Cryptol. ePrint Arch. 2005: 254 (2005) - [i9]John Kelsey, Tadayoshi Kohno:
Herding Hash Functions and the Nostradamus Attack. IACR Cryptol. ePrint Arch. 2005: 281 (2005) - [i8]Kevin Fu, Seny Kamara, Tadayoshi Kohno:
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage. IACR Cryptol. ePrint Arch. 2005: 303 (2005) - 2004
- [j4]Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre:
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. ACM Trans. Inf. Syst. Secur. 7(2): 206-241 (2004) - [c12]Tadayoshi Kohno:
Attacking and repairing the winZip encryption scheme. CCS 2004: 72-81 - [c11]Mihir Bellare, Tadayoshi Kohno:
Hash Function Balance and Its Impact on Birthday Attacks. EUROCRYPT 2004: 401-418 - [c10]Tadayoshi Kohno, John Viega, Doug Whiting:
CWC: A High-Performance Conventional Authenticated Encryption Mode. FSE 2004: 408-426 - [c9]Tetsu Iwata, Tadayoshi Kohno:
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. FSE 2004: 427-445 - [c8]Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach:
Analysis of an Electronic Voting System. S&P 2004: 27- - [i7]Tetsu Iwata, Tadayoshi Kohno:
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. IACR Cryptol. ePrint Arch. 2004: 19 (2004) - [i6]Tadayoshi Kohno:
Analysis of the WinZip encryption method. IACR Cryptol. ePrint Arch. 2004: 78 (2004) - 2003
- [c7]Mihir Bellare, Tadayoshi Kohno:
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications. EUROCRYPT 2003: 491-506 - [c6]Lars R. Knudsen, Tadayoshi Kohno:
Analysis of RMAC. FSE 2003: 182-191 - [c5]Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno:
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. FSE 2003: 330-346 - [i5]Mihir Bellare, Tadayoshi Kohno:
Hash Function Balance and its Impact on Birthday Attacks. IACR Cryptol. ePrint Arch. 2003: 65 (2003) - [i4]Tadayoshi Kohno, John Viega, Doug Whiting:
CWC: A high-performance conventional authenticated encryption mode. IACR Cryptol. ePrint Arch. 2003: 106 (2003) - [i3]Tadayoshi Kohno, Adriana Palacio, John Black:
Building Secure Cryptographic Transforms, or How to Encrypt and MAC. IACR Cryptol. ePrint Arch. 2003: 177 (2003) - 2002
- [j3]John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw:
Token-based scanning of source code for security problems. ACM Trans. Inf. Syst. Secur. 5(3): 238-261 (2002) - [c4]Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre:
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. CCS 2002: 1-11 - [i2]Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre:
Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm. IACR Cryptol. ePrint Arch. 2002: 78 (2002) - [i1]Tadayoshi Kohno:
Related-Key and Key-Collision Attacks Against RMAC. IACR Cryptol. ePrint Arch. 2002: 159 (2002) - 2001
- [j2]John Viega, Tadayoshi Kohno, Bruce Potter:
Trust (and mistrust) in secure applications. Commun. ACM 44(2): 31-36 (2001) - [j1]Harold N. Gabow, Tadayoshi Kohno:
A Network-Flow-Based Scheduler: Design, Performance History, and Experimental Analysis. ACM J. Exp. Algorithmics 6: 3 (2001) - [c3]Tadayoshi Kohno, Mark McGovern:
On the Global Content PMI: Improved Copy-Protected Internet Content Distribution. Financial Cryptography 2001: 70-81 - 2000
- [c2]Tadayoshi Kohno, John Kelsey, Bruce Schneier:
Preliminary Cryptanalysis of Reduced-Round Serpent. AES Candidate Conference 2000: 195-211 - [c1]John Kelsey, Tadayoshi Kohno, Bruce Schneier:
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. FSE 2000: 75-93
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint