Alexander Vetterl
| Name: | Alexander Vetterl |
| Affiliation: | University of Cambridge |
| E-mail: | (only provided to users who are logged into talks.cam) |
| Last login: | 22 Jan 2020, 3:24 p.m. |
Public lists managed by Alexander Vetterl
Talks given by Alexander Vetterl
Obviously this only lists talks that are listed through talks.cam. Furthermore, this facility only works if the speaker's e-mail was specified in a talk. Most talks have not done this.
Talks organised by Alexander Vetterl
This list is based on what was entered into the 'organiser' field in a talk. It may not mean that Alexander Vetterl actually organised the talk, they may have been responsible only for entering the talk into the talks.cam system.
- Security economics to inform behaviour change support
- It's Damn Hard to Decentralise the Web
- Radio Protocol Vulnerabilities in 5G Networks
- Automatically Dismantling Online Dating Fraud
- Reducing Metadata Leakage from Encrypted Files and Communication
- An analysis of the threats of the consumer spyware industry
- Deploying Differential Privacy for the 2020 Census of Population and Housing
- rust-vmm: Building the Virtualization Stack of the Future
- Firecracker microVMs - How to Securely Run Thousands of Workloads on a Single Host
- A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions
- Securing Systems with Insecure Hardware
- “Doing more” to keep children safe online – why the tech sector can only do so much
- Thunderclap: Exploring Vulnerabilities Operating System IOMMU Protection via DMA from Untrustworthy Peripherals
- Keeping authorities honest with verifiable append-only logs, and making backdoored software updates detectable
- Evil on the Internet
- Trustworthy and Accountable Function-as-a-Service using Intel SGX
- Function-Based Access Control
- The ideal versus the real: A brief history of secure isolation in virtual machines and containers
- Cybercrime in the Sky
- Displacing big data: How cybercriminals cheat the system
- You think you're not a target? A tale of three developers
- The Guardian Council: Using many-core architectures to support programmable hardware security
- Combating a hydra: Islamic State's digital jihad as a threat to international security
- Detecting Spies in Sensor-Rich Environments using Cyber-Physical Correlation
- Ethical Issues in Network Measurement
- Data science approaches to understanding key actors on online hacking forums
- Wireless Physical-layer Security: Fundamentals and Jamming with Coding for Secrecy
- Large Scale Ubiquitous Data Sources for Crime Prediction
- Psychological predictors of risky online behaviour: The cases of online piracy and privacy
- Anonymity in Cryptocurrencies
- The impact of cybercrime on businesses: A new conceptual framework and its application to Belgium
- Bayes, not Naive: Security Bounds on Website Fingerprinting Defenses
- Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
- Analysis and Classification of Android Malware
- Conditional Linear Cryptanalysis
- Protecting Analog Sensor Security
![[Talks.cam]](/static/images/talkslogosmall.gif)
