1st Workshop on Data Integrity and Secure Cloud Computing (DISCC-2022)Pradip BoseJennifer Dworaket al.2022MICRO 2022
Sequential Digital Signatures for Cryptographic Software-Update AuthenticationBertram PoetteringSimon Rastikian2022ESORICS 2022
The Devil is in the GAN: Backdoor Attacks and Defenses in Deep Generative ModelsAmbrish RawatKillian Levacheret al.2022ESORICS 2022
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through PreprocessingJonathan BootleKaoutar El Khiyaouiet al.2022ESORICS 2022
Atomic cross-chain exchanges of shared assetsKrishnasuri NarayanamVenkatraman Ramakrishnaet al.2022AFT 2022
Robust Learning Protocol for Federated Tumor Segmentation ChallengeAmbrish RawatGiulio Zizzoet al.2022MICCAI 2022
No More Turtles: The SecondaryVM Framework - An Alternative to Nested VirtualizationMengmei YeAngelo Ruocco2022KVM Forum 2022
DSON: JSON CRDT Using Delta-Mutations For Document StoresArik RinbergTomer Solomonet al.2022VLDB 2022