Similar Items: Can I Check What I Designed? Mapping Security Design DSLs to Code Analyzers
- I can't recognize (yet): Delayed Rendering to Defeat Visual Phishing Detectors
- SILMARILS: Information-Theoretic and Quantum-Secure Designated-Verifier Signatures
- Analyzing Unsolicited Internet Traffic: Measuring IoT Security Threats via Network Telescopes
- A Privacy-Preserving Approach to Conformance Checking
- On the (In-)Security of the Shuffling Defense in the Transformer Secure Inference
- Design and Performance Evaluation of a BLE-Based IoT Authentication System