Alexei Czeskis
Alexei Czeskis
Securineer, Google
Email confirmado em - Página inicial
Citado por
Citado por
Experimental security analysis of a modern automobile
K Koscher, S Savage, F Roesner, S Patel, T Kohno, A Czeskis, D McCoy, ...
2010 IEEE Symposium on Security and Privacy, 447-462, 2010
Comprehensive experimental analyses of automotive attack surfaces.
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
USENIX Security Symposium 4 (447-462), 2021, 2011
Strengthening user authentication through opportunistic cryptographic identity assertions
A Czeskis, M Dietz, T Kohno, D Wallach, D Balfanz
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Parenting from the pocket: Value tensions and technical directions for secure and private parent-teen mobile safety
A Czeskis, I Dermendjieva, H Yapit, A Borning, B Friedman, B Gill, ...
Proceedings of the sixth symposium on usable privacy and security, 1-15, 2010
RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
A Czeskis, K Koscher, JR Smith, T Kohno
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Origin-bound certificates: A fresh approach to strong client authentication for the web
M Dietz, A Czeskis, D Balfanz, DS Wallach
21st {USENIX} Security Symposium ({USENIX} Security 12), 317-331, 2012
Universal 2nd factor (U2F) overview
S Srinivas, D Balfanz, E Tiffany, A Czeskis, F Alliance
FIDO Alliance Proposed Standard 15, 2015
Defeating Encrypted and Deniable File Systems: TrueCrypt v5. 1a and the Case of the Tattling OS and Applications.
A Czeskis, DJS Hilaire, K Koscher, SD Gribble, T Kohno, B Schneier
HotSec, 2008
Origin cookies: Session integrity for web applications
A Bortz, A Barth, A Czeskis
Web 2.0 Security and Privacy (W2SP), 2011
Security Keys: Practical Cryptographic Second Factors for the Modern Web
J Lang, A Czeskis, D Balfanz, M Schilder, S Srinivas
Twentieth International Conference on Financial Cryptography and Data Security, 2016
Lightweight server support for browser-based CSRF protection
A Czeskis, A Moshchuk, T Kohno, HJ Wang
Proceedings of the 22nd international conference on World Wide Web, 273-284, 2013
Auto-user registration and unlocking of a computing device
J Woodward, JP Civelli, D Balfanz, M Fucci, A Czeskis, S Nishit, K Liu, ...
US Patent 9,276,914, 2016
Fido nfc protocol specification v1. 0
A Czeskis, J Lang
FIDO Alliance Proposed Standard, 1-5, 2015
Traceable and automatic compliance of privacy policies in federated digital identity management
A Squicciarini, A Bhargav-Spantzel, A Czeskis, E Bertino
International Workshop on Privacy Enhancing Technologies, 78-98, 2006
The High Cost of Free Services: Problems with Surveillance Capitalism and Possible Alternatives for IT Infrastructure
M Landwehr, A Borning, V Wulf
Proceedings of the Fifth Workshop on Computing within Limits, 1-10, 2019
St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, and Bruce Schneier, Defeating Encrypted and Deniable File Systems: TrueCrypt v5. 1a and the Case of the Tattling …
A Czeskis, J David
Proceedings of the 3rd Conference on Hot Topics in Security, 7, 2008
Radio frequency identification secret handshakes
T Kohno, A Czeskis, K Koscher, JR Smith
US Patent 8,643,475, 2014
Protected login
A Czeskis, D Balfanz
International Conference on Financial Cryptography and Data Security, 44-52, 2012
Web authentication: An API for accessing public key credentials
D Balfanz, A Czeskis, J Hodges, JJC Jones, MB Jones, A Kumar, A Liao, ...
tech. rep., W3C Recommendation, 2019
The Transfer Access Protocol-Moving to New Authenticators in the FIDO Ecosystem
A Takakuwa, T Kohno, A Czeskis
Technical Report UW-CSE-17–06-01, 2017
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20