USENIX

Results: 1311



#Item
121Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose, The University of North Carolina at Chapel Hill https://www.usenix

Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose, The University of North Carolina at Chapel Hill https://www.usenix

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-08-10 04:01:14
    122COLUMNS  The Networks of Reinvention DAV I D B E A Z L E Y  David Beazley is an open

    COLUMNS The Networks of Reinvention DAV I D B E A Z L E Y David Beazley is an open

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
      123Password Managers: Attacks and Defenses David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen and Collin Jackson, Carnegie Mellon University https://www.usenix.org/conference/usenixsecurity14/technical-

      Password Managers: Attacks and Defenses David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen and Collin Jackson, Carnegie Mellon University https://www.usenix.org/conference/usenixsecurity14/technical-

      Add to Reading List

      Source URL: www.usenix.org

      Language: English - Date: 2016-02-20 08:20:34
        124THE ADVANCED COMPUTING SYSTEMS ASSOCIATION  The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference

        THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference

        Add to Reading List

        Source URL: static.usenix.org

        Language: English - Date: 1999-06-14 15:28:14
          125Satellite: Joint Analysis of CDNs and Network-Level Interference Will Scott, Thomas Anderson, Tadayoshi Kohno, and Arvind Krishnamurthy, University of Washington https://www.usenix.org/conference/atc16/technical-sessions

          Satellite: Joint Analysis of CDNs and Network-Level Interference Will Scott, Thomas Anderson, Tadayoshi Kohno, and Arvind Krishnamurthy, University of Washington https://www.usenix.org/conference/atc16/technical-sessions

          Add to Reading List

          Source URL: www.usenix.org

          Language: English - Date: 2016-06-22 03:22:54
          126Language-integrated Provenance in Links Stefan Fehrenbach James Cheney  University of Edinburgh

          Language-integrated Provenance in Links Stefan Fehrenbach James Cheney University of Edinburgh

          Add to Reading List

          Source URL: www.usenix.org

          Language: English - Date: 2016-02-21 07:35:22
            127Who are you now? Fading to multiple personas Sven Dietrich Michael Brenner  Katharina Krombholz

            Who are you now? Fading to multiple personas Sven Dietrich Michael Brenner Katharina Krombholz

            Add to Reading List

            Source URL: www.usenix.org

            Language: English - Date: 2016-06-22 06:49:10
              128Published in Proceedings of 2008 USENIX Annual Technical Conference  Fast, Inexpensive Content-Addressed Storage in Foundation Sean Rhea∗, Meraki, Inc.

              Published in Proceedings of 2008 USENIX Annual Technical Conference Fast, Inexpensive Content-Addressed Storage in Foundation Sean Rhea∗, Meraki, Inc.

              Add to Reading List

              Source URL: swtch.com

              Language: English - Date: 2015-05-31 20:49:46
                129USENIX Association  Proceedings of the FREENIX Track: 2004 USENIX Annual Technical Conference Boston, MA, USA June 27–July 2, 2004

                USENIX Association Proceedings of the FREENIX Track: 2004 USENIX Annual Technical Conference Boston, MA, USA June 27–July 2, 2004

                Add to Reading List

                Source URL: www.cyrius.com

                Language: English - Date: 2018-04-14 16:08:56