|
Laurent Simon
Name: | Laurent Simon |
Affiliation: | University of Cambridge |
E-mail: | (only provided to users who are logged into talks.cam) |
Last login: | Mon Jul 03 14:27:13 +0000 2017 |
Public lists managed by Laurent Simon
Talks given by Laurent Simon
Obviously this only lists talks that are listed through talks.cam. Furthermore, this facility only works if the speaker's e-mail was specified in a talk. Most talks have not done this.
Talks organised by Laurent Simon
This list is based on what was entered into the 'organiser' field in a talk. It may not mean that Laurent Simon actually organised the talk, they may have been responsible only for entering the talk into the talks.cam system.
- SECURE project
- abraCARDabra: understanding carding forums
- Anti-surveillance: Can Applied Cryptography, Law Enforcement, and Formal Methods be Friends?
- What could we actually do about radicalisation, both online and offline?
- Improving the Impact of Smartphone Apps
- Free-Form Gesture Passwords: Security, Memorability, Usability
- On the Privacy and Security of the Ultrasound Ecosystem
- Trends in Online Payment Security
- Reversing chip design for hardware security characterization
- Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
- The Million-Key Question : Investigating the Origins of RSA Public Keys (Best Paper Award @ USENIX Security 2016)
- Semantics derived automatically from language corpora necessarily contain human biases
- Cyberinsurance: good for your company, bad for your country?
- Understanding, Characterizing, and Detecting Facebook Like Farms
- Do You See What I See? Differential Treatment of Anonymous Users
- The Unfalsifiability of security claims
- Android security: Protecting users, a billion at a time
- Identification and Investigation of Cyber Risk Hotspots in a Large Computer Network
- About the (in)security of CAPTCHAs
- Decertifying the Worst Voting Machine in the US: Lessons Learned and Looking Forward
- Behavioral Decision Making in Interdependent Security Games
- Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer
- Massively Parallel Hardware Security Platform
- Making Better Privacy Decisions in Ubiquitous Computing Environments
- Insecure processing of cookies in modern web applications and browsers
- Massively Parallel Hardware Security Platform
- Information-flow tracking for web technologies
- On the power of techniques for defeating code reuse attacks + some retrospective reflection on the DARPA CRASH program
- The Dutch electronic patient record system and beyond - towards physician-controlled decentralized medical record exchange.
- Captchas - the state of play
- Understanding and Fighting Malicious Activity on Online Social Networks
- Chupja--PHY Covert Channels: Can you see the Idles?
- Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation
- Human factors and missed solutions to WWII Enigma design weaknesses
- Single Password Authentication
- Applying game theory to cybersecurity problems
- Cloud-centric assured information sharing
- Hacking is not random: a case-control study of webserver-compromise risk
- A Look at the Consequences of Internet Censorship Through an ISP Lens
- Bitcoin as a source of verifiable public randomness
- DP5: Privacy-preserving Presence Protocols
- Micro-Policies: A Framework for Tag-Based Security Monitors
- From TLS to secure websites: the HTTPS landmine
- Safe Shell Scripting with Capabilities and Contracts
- Trust, Religion, and Tribalism: Reflections on the Sociological Data from the Balkans
- Security, Reliability and Backdoors
- Psychology of malware warnings
- Building a Cyber eco-system
- Protecting Programs During Resource Retrieval
- Bitcoin: A Full Employment Act for security engineers?
- On the (in)security of widely-used RFID access control systems
- The effect of decentralized behavioral decision making on system-level risk
- Eavesdropping near field contactless payments: A quantitative analysis
- Privacy/Proxy/Perfidy – what criminals (and others) put in domain whois
- Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet.
- Reviewing Cybercrime; Epistemology, Political Economy and Models
- TESLA: Temporally-enhanced security logic assertions
- A day in the life of government cybersecurity
- In-depth crypto attacks: "It always takes two bugs"
- TLS Security - Where Do We Stand?
- PHANTOM: A Parallel Architecture for Practical Oblivious Computation
- Rendezvous: A search engine for binary code
- Pins, Tacks, and Slinks: Proposals for patching PKI on the web
- CERB Banking: How to secure online banking and keep the users happy?
- Protecting your website from hackers
|