Benjamin

Results: 8859



#Item
11Cardiac electrophysiology / Medical devices / Neuroprosthetics / Medicine / Technology / Computing / Cybernetics / Implantable cardioverter-defibrillator / International Statistical Classification of Diseases and Related Health Problems / Universal Software Radio Peripheral / Artificial cardiac pacemaker / Radio-frequency identification

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin† Thomas S. Heydt-Benjamin†

Add to Reading List

Source URL: www.secure-medicine.org

Language: English - Date: 2017-10-06 05:31:23
12Computer security / Computing / Computer network security / Security engineering / Information and communications technology / Crime prevention / Cryptography / National security / Virtual private network / SCADA / FBI Criminal Justice Information Services Division / Computer network

A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
13

8 8 Esther Oswald, Benjamin Rubeli, Regine Berger

Add to Reading List

Source URL: www.hep-verlag.ch

Language: German - Date: 2018-10-24 06:17:24
    14Cache / Computer architecture / Latency

    RobinHood: Tail Latency-Aware Caching Dynamically Reallocating from Cache-Rich to Cache-Poor Daniel S. Berger (CMU) Joint work with: Benjamin Berg (CMU), Timothy Zhu (PennState), Siddhartha Sen (Microsoft Research), Mor

    Add to Reading List

    Source URL: platformlab.stanford.edu

    Language: English - Date: 2018-10-15 19:25:55
    15Cryptocurrencies / Cryptography / Bitcoin / Computing / Alternative currencies / Economy / Blockchains / Transport Layer Security / Mining pool / Proof-of-stake / Cryptographic nonce / Peercoin

    DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work Eric Wustrow University of Colorado Boulder Benjamin VanderSloot University of Michigan

    Add to Reading List

    Source URL: benvds.com

    Language: English - Date: 2018-09-18 11:06:16
    16Computational complexity theory / Logic / Mathematics / Randomized algorithms / Automated theorem proving / Logic programming / Probabilistically checkable proof / IP / NP / Substitution / MAX-3SAT / operator

    Resolving the conflict between generality and plausibility in verified computation Srinath Setty? , Benjamin Braun? , Victor Vu? , Andrew J. Blumberg? , Bryan Parno† , and Michael Walfish? ? The University of Texas at

    Add to Reading List

    Source URL: www.pepper-project.org

    Language: English - Date: 2017-11-11 14:59:54
    17Information and communications technology / Computing / Internet / Internet privacy / Computer networking / File sharing / Transport Layer Security / Network performance / Proxy server / Computer network / Internet censorship circumvention / Transmission Control Protocol

    An ISP-Scale Deployment of TapDance Sergey Frolov1 , Fred Douglas3 , Will Scott5 , Allison McDonald5 , Benjamin VanderSloot5 , Rod Hynes6 , Adam Kruger6 , Michalis Kallitsis4 , David G. Robinson7 , Steve Schultze2 , Niki

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
    18Computing / Content delivery networks / Concurrent computing / Internet / Distributed data storage / Internet security / Computer networking / Cloudflare / Freedom of speech in the United States / Geo-blocking / Akamai Technologies / Amazon CloudFront

    403 Forbidden: A Global View of CDN Geoblocking Allison McDonald University of Michigan Benjamin VanderSloot

    Add to Reading List

    Source URL: ensa.fi

    Language: English - Date: 2018-09-24 17:21:27
    19Information and communications technology / Computing / Internet / Internet privacy / Computer networking / File sharing / Transport Layer Security / Network performance / Proxy server / Computer network / Internet censorship circumvention / Transmission Control Protocol

    An ISP-Scale Deployment of TapDance Sergey Frolov1 , Fred Douglas3 , Will Scott5 , Allison McDonald5 , Benjamin VanderSloot5 , Rod Hynes6 , Adam Kruger6 , Michalis Kallitsis4 , David G. Robinson7 , Steve Schultze2 , Niki

    Add to Reading List

    Source URL: benvds.com

    Language: English - Date: 2018-09-18 11:06:16
    20Data management / Computing / Data / Relational database management systems / Database theory / NoSQL / Structured storage / Database / NewSQL / Relational database / ODB / Conjunctive query

    SoK: Cryptographically Protected Database Search Benjamin Fuller∗ , Mayank Varia† , Arkady Yerukhimovich‡ , Emily Shen‡ , Ariel Hamlin‡ , Vijay Gadepally‡ , Richard Shay‡ , John Darby Mitchell‡ , and Robe

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:01:55
    UPDATE