Folgen
Joseph Inkuk Choi
Joseph Inkuk Choi
Graduate Student, University of Florida
Bestätigte E-Mail-Adresse bei ufl.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities
JI Choi, KRB Butler
Security and Communication Networks (SCN) 2019 (Article ID 1368905), 2019
552019
ATtention Spanned: Comprehensive Vulnerability Analysis of {AT} Commands Within the Android Ecosystem
DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 273-290, 2018
402018
LBM: A Security Framework for Peripherals within the Linux Kernel
DJ Tian, G Hernandez, JI Choi, V Frost, PC Johnson, KRB Butler
Proceedings of the 40th IEEE Symposium on Security and Privacy (IEEE S&P), 2019
302019
A Hybrid Approach to Secure Function Evaluation using SGX
JI Choi, DJ Tian, G Hernandez, C Patton, B Mood, T Shrimpton, ...
Proceedings of the ACM Asia Conference on Information, Computer and …, 2019
202019
A Practical Intel SGX Setting for Linux Containers in the Cloud
DJ Tian, JI Choi, G Hernandez, P Traynor, KRB Butler
Proceedings of the 9th ACM Conference on Data and Application Security and …, 2019
202019
Securing ARP/NDP From the Ground Up
D Tian, K Butler, JI Choi, PD McDaniel, P Krishnaswamy
IEEE Transactions on Information Forensics and Security, 2017
182017
Explainable Black-Box Attacks Against Model-based Authentication
W Garcia, JI Choi, SK Adari, S Jha, KRB Butler
arXiv preprint arXiv:1810.00024, 2018
142018
One-time programs made practical
L Zhao, JI Choi, D Demirag, KRB Butler, M Mannan, E Ayday, J Clark
Proceedings of the International Conference on Financial Cryptography and …, 2019
82019
Privacy Preserving Localization Using a Distributed Particle Filtering Protocol
T Ward, J Choi, K Butler, JM Shea, P Traynor, TF Wong
IEEE Military Communications Conference (MILCOM), 2017
42017
Enclave-based privacy-preserving localization: poster
JI Choi, DJ Tian, T Ward, KRB Butler, P Traynor, JM Shea, TF Wong
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–10