Billy Bob Brumley
Orcid: 0000-0001-9160-0463Affiliations:
- Rochester Institute of Technology, NY, USA
- Tampere University, Finland (former)
According to our database1,
Billy Bob Brumley
authored at least 46 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing, 2025
2024
Investigating child sexual abuse material availability, searches, and users on the anonymous Tor network for a public health intervention strategy.
CoRR, 2024
2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
IACR Cryptol. ePrint Arch., 2020
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Int. J. Parallel Program., 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Cybersecurity Development, 2019
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
Proceedings of the Information Security, 16th International Conference, 2013
2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 20th IEEE Symposium on Computer Arithmetic, 2011
2010
IEEE Trans. Computers, 2010
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
Proceedings of the Progress in Cryptology, 2009
2008
Proceedings of the Public Key Infrastructure, 2008
Implementing Cryptography for Packet Level Authentication.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the Information Security, 10th International Conference, 2007
2006
Left-to-Right Signed-Bit <i>tau</i>-Adic Representations of <i>n</i> Integers (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006