All Stories

  1. End-to-End Encrypted Git Services
  2. AHB: Post-Quantum Ad Hoc Blockchain for Private Barter (Extended Abstract)
  3. End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage
  4. Adversarial Missingness Attacks on Causal Structure Learning
  5. Security notion applicable to 3D printing (AM)
  6. What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files
  7. Mitigating Leakage in Secure Cloud-Hosted Data Structures
  8. From Mental Poker to Core Business