Alexei Czeskis
Alexei Czeskis
Securineer, Google
Verified email at - Homepage
Cited by
Cited by
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
2010 IEEE Symposium on Security and Privacy, 447-462, 2010
Comprehensive experimental analyses of automotive attack surfaces.
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
USENIX Security Symposium 4, 447-462, 2011
Strengthening user authentication through opportunistic cryptographic identity assertions
A Czeskis, M Dietz, T Kohno, D Wallach, D Balfanz
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
A Czeskis, K Koscher, JR Smith, T Kohno
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Parenting from the pocket: Value tensions and technical directions for secure and private parent-teen mobile safety
A Czeskis, I Dermendjieva, H Yapit, A Borning, B Friedman, B Gill, ...
Proceedings of the sixth symposium on usable privacy and security, 1-15, 2010
Origin-bound certificates: A fresh approach to strong client authentication for the web
M Dietz, A Czeskis, D Balfanz, DS Wallach
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
Universal 2nd factor (U2F) overview
S Srinivas, D Balfanz, E Tiffany, A Czeskis, F Alliance
FIDO Alliance Proposed Standard, 1-5, 2015
Defeating Encrypted and Deniable File Systems: TrueCrypt v5. 1a and the Case of the Tattling OS and Applications.
A Czeskis, DJS Hilaire, K Koscher, SD Gribble, T Kohno, B Schneier
HotSec, 2008
Origin cookies: Session integrity for web applications
A Bortz, A Barth, A Czeskis
Web 2.0 Security and Privacy (W2SP), 2011
Lightweight server support for browser-based CSRF protection
A Czeskis, A Moshchuk, T Kohno, HJ Wang
Proceedings of the 22nd international conference on World Wide Web, 273-284, 2013
Security Keys: Practical Cryptographic Second Factors for the Modern Web
J Lang, A Czeskis, D Balfanz, M Schilder, S Srinivas
Twentieth International Conference on Financial Cryptography and Data Security, 2016
Fido nfc protocol specification v1. 0
A Czeskis, J Lang
FIDO Alliance Proposed Standard, 1-5, 2015
St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, and Bruce Schneier, Defeating Encrypted and Deniable File Systems: TrueCrypt v5. 1a and the Case of the Tattling …
A Czeskis, J David
Proceedings of the 3rd conference on Hot topics in security, 1-7, 2008
Auto-user registration and unlocking of a computing device
J Woodward, JP Civelli, D Balfanz, M Fucci, A Czeskis, S Nishit, K Liu, ...
US Patent 9,276,914, 2016
Traceable and automatic compliance of privacy policies in federated digital identity management
A Squicciarini, A Bhargav-Spantzel, A Czeskis, E Bertino
International Workshop on Privacy Enhancing Technologies, 78-98, 2006
Radio frequency identification secret handshakes
T Kohno, A Czeskis, K Koscher, JR Smith
US Patent 8,643,475, 2014
Protected login
A Czeskis, D Balfanz
International Conference on Financial Cryptography and Data Security, 44-52, 2012
The High Cost of Free Services: Problems with Surveillance Capitalism and Possible Alternatives for IT Infrastructure
M Landwehr, A Borning, V Wulf
Proceedings of the Fifth Workshop on Computing within Limits, 1-10, 2019
Privacy policies compliance across digital identity management systems
AC Squicciarini, A Czeskis, A Bhargav-Spantzel
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on …, 2008
The Transfer Access Protocol-Moving to New Authenticators in the FIDO Ecosystem
A Takakuwa, T Kohno, A Czeskis
Technical Report UW-CSE-17–06-01, 2017
The system can't perform the operation now. Try again later.
Articles 1–20