Search results

Results 1 – 18 of 18
Advanced search

Search in namespaces:

There is a page named "Vitaly Shmatikov" on Wikipedia

  • Vitaly Shmatikov is a professor in computer security at Cornell Tech. Shmatikov obtained his M.S. in engineering-economic systems at Stanford University...
    5 KB (453 words) - 10:24, 9 March 2024
  • Arvind; Shmatikov, Vitaly. "Robust De-anonymization of Large Sparse Datasets" (PDF). Retrieved 19 January 2014. Narayanan, Arvind; Shmatikov, Vitaly (22 November...
    26 KB (3,164 words) - 20:59, 12 July 2024
  • advocates. In 2007 two researchers from The University of Texas at Austin (Vitaly Shmatikov and Arvind Narayanan) were able to identify individual users by matching...
    25 KB (2,882 words) - 02:40, 28 February 2024
  • Thumbnail for Arvind Narayanan
    computer science from the University of Texas at Austin in 2009 under Vitaly Shmatikov. He worked briefly as a post-doctoral researcher at Stanford University...
    10 KB (642 words) - 22:52, 15 June 2024
  • in the Personal Genome Project. Additionally, Arvind Narayanan and Vitaly Shmatikov discussed on quasi-identifiers to indicate statistical conditions for...
    3 KB (419 words) - 06:53, 9 July 2024
  • explicitly works with committed input was proposed by Stanisław Jarecki and Vitaly Shmatikov. The security of a two-party computation protocol is usually defined...
    9 KB (1,094 words) - 14:14, 27 March 2024
  • The Register. "Port Scan attacks and its detection methodologies". Vitaly Shmatikov; Ming-Hsiu Wang. "Security Against Probe-Response Attacks in Collaborative...
    22 KB (2,702 words) - 20:55, 15 January 2024
  • 2013. pp. 1–16. ISBN 978-3-642-41320-9. Martin Georgiev; Suman Jana; Vitaly Shmatikov. "Rethinking Security of Web-Based System Applications" (PDF). 24th...
    11 KB (1,369 words) - 23:31, 4 June 2024
  • 1049/iet-ifs.2014.0386. ISSN 1751-8717. S2CID 45091791. Son, Sooel; Shmatikov, Vitaly. "The Hitchhiker's Guide to DNS Cache Poisoning" (PDF). Cornell University...
    12 KB (1,403 words) - 21:27, 18 July 2024
  • Thumbnail for Onion routing
    Second-Generation Onion Router" (PDF). Retrieved 26 February 2011. Shmatikov, Wang; Ming-Hsiu Vitaly (2006). "Timing Analysis in Low-Latency Mix Networks: Attacks...
    15 KB (1,806 words) - 17:03, 9 July 2024
  • Restoration from Backup Started" Blog at Cli.gs (16 June 2009). "Shmatikov, Vitaly, "Gone In Six Characters: Short URLs Considered Harmful for Cloud...
    37 KB (3,828 words) - 15:56, 23 July 2024
  • S2CID 52898716. Roy, Indrajit; Setty, Srinath T.V.; Kilzer, Ann; Shmatikov, Vitaly; Witchel, Emmett (April 2010). "Airavat: Security and Privacy for...
    14 KB (882 words) - 03:25, 13 July 2024
  • doi:10.1142/S0218488502001648. S2CID 361794. Narayanan, Arvind; Shmatikov, Vitaly. "Robust De-anonymization of Large Sparse Datasets" (PDF). Roberto...
    16 KB (1,849 words) - 20:19, 13 May 2024
  • 1973. doi:10.1145/1880022.1880029. S2CID 9622722. Schuster, Roei; Shmatikov, Vitaly; Tromer, Eran (August 2017). Beauty and the Burst: Remote Identification...
    23 KB (3,307 words) - 18:11, 14 February 2024
  • Thumbnail for Mix network
    routing and mix networks", ritter.vg Retrieved December 8, 2016. Shmatikov, Vitaly; Wang, Ming-Hsiu (2006). "Timing Analysis in Low-Latency Mix Networks:...
    17 KB (2,672 words) - 16:28, 9 July 2024
  • Martin; Iyengar, Subodh; Jana, Suman; Anubhai, Rishita; Boneh, Dan; Shmatikov, Vitaly (2012). The most dangerous code in the world: validating SSL certificates...
    179 KB (17,630 words) - 05:48, 23 July 2024
  • Thumbnail for Searchable symmetric encryption
    Symposium". Retrieved 2022-02-22. Grubbs, Paul; Ristenpart, Thomas; Shmatikov, Vitaly (2017-05-07). "Why Your Encrypted Database is Not Secure". Proceedings...
    17 KB (2,431 words) - 03:06, 22 July 2024
  • PMC 6191664. PMID 30322998. Shokri, Reza; Stronati, Marco; Song, Congzheng; Shmatikov, Vitaly (2017-03-31). "Membership Inference Attacks against Machine Learning...
    65 KB (7,434 words) - 21:32, 22 June 2024