Alexei Czeskis

Orcid: 0000-0002-9048-0460

According to our database1, Alexei Czeskis authored at least 15 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2016
Security Keys: Practical Cryptographic Second Factors for the Modern Web.
Proceedings of the Financial Cryptography and Data Security, 2016

2013
Practical, Usable, and Secure Authentication and Authorization on the Web.
PhD thesis, 2013

Lightweight server support for browser-based CSRF protection.
Proceedings of the 22nd International World Wide Web Conference, 2013

2012
Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Protected Login.
Proceedings of the Financial Cryptography and Data Security, 2012

High Stakes: Designing a Privacy Preserving Registry.
Proceedings of the Financial Cryptography and Data Security, 2012

Strengthening user authentication through opportunistic cryptographic identity assertions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
Experimental Security Analysis of a Modern Automobile.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

2008
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Privacy policies compliance across digital identity management systems.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2006
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006


  Loading...