Saar Drimer
| Name: | Saar Drimer |
| Affiliation: | University of Cambridge |
| E-mail: | (only provided to users who are logged into talks.cam) |
| Last login: | 24 Mar 2009, 9:40 p.m. |
Public lists managed by Saar Drimer
Talks given by Saar Drimer
Obviously this only lists talks that are listed through talks.cam. Furthermore, this facility only works if the speaker's e-mail was specified in a talk. Most talks have not done this.
Talks organised by Saar Drimer
This list is based on what was entered into the 'organiser' field in a talk. It may not mean that Saar Drimer actually organised the talk, they may have been responsible only for entering the talk into the talks.cam system.
- Title to be confirmed
- Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration
- Advances in Hash Cryptanalysis
- Is SSL provably secure ?
- Graphical passwords: some recent results
- Security seminar presentation
- Networked information processing and privacy in Japan
- Authentication protocols based on human interaction in security pervasive computing
- Key amplification in unstructured networks
- Synergy of crime science and security engineering
- High security locks: illusion or reality
- Attacks on real-world wireless sensor networks
- Keep your enemies close: Distance bounding against smartcard relay attacks
- OpenHSM: An Open key life cycle protocol for Public Key Infrastructure's Hardware Security Modules
- Realities of online banking fraud
- Towards open trusted computing frameworks
- The commercial malware industry
- Phishing tips and techniques: tackle, rigging, and how and when to phish
- Alternative security mechanisms for WiFi networks
- Power analysis attacks
- Anonymity in the wild: Mixes on unstructured networks
- Data sharing and privacy in multi-agency working
- A reciprocation-based economy for multiple services in P2P grids
- Privacy preserving censorship
- Politics of Internet Security
- Optically enhanced position-locked power analysis
- Becoming paranoid or, How I learned to start worrying and fear the Internet
- The Polygraph
- Distance bounding protocols: Authentication logic analysis
- Daonity - Grid security with behaviour conformity from Trusted Computing
- Privacy preserving data mining in distributed databases
- Daonity - Grid security with behaviour conformity from Trusted Computing
- Peer-to-peer network topologies and anonymity
- Milk or wine: does software security improve with age?
- Bluetooth Simple Pairing: public key cryptography in adhoc wireless systems
- Enhancing Signature-based Collaborative Spam Detection
- Security Flaws in Tunnel Mode IPsec
- Hiding on an Ethernet
- Design and implementation of a CC CAPP-compliant audit subsystem for the Mac OS X and FreeBSD operating systems
- Covert channels in TCP/IP: attack and defence
![[Talks.cam]](/static/images/talkslogosmall.gif)
