Alexei Czeskis
Alexei Czeskis
Securineer, Google
Verified email at czeskis.com - Homepage
TitleCited byYear
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
2010 IEEE Symposium on Security and Privacy, 447-462, 2010
13892010
Comprehensive experimental analyses of automotive attack surfaces.
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
USENIX Security Symposium 4, 447-462, 2011
11772011
Strengthening user authentication through opportunistic cryptographic identity assertions
A Czeskis, M Dietz, T Kohno, D Wallach, D Balfanz
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
123*2012
RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
A Czeskis, K Koscher, JR Smith, T Kohno
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1092008
Origin-bound certificates: A fresh approach to strong client authentication for the web
M Dietz, A Czeskis, D Balfanz, DS Wallach
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
972012
Parenting from the pocket: Value tensions and technical directions for secure and private parent-teen mobile safety
A Czeskis, I Dermendjieva, H Yapit, A Borning, B Friedman, B Gill, ...
Proceedings of the sixth symposium on usable privacy and security, 15, 2010
932010
Universal 2nd factor (U2F) overview
S Srinivas, D Balfanz, E Tiffany, A Czeskis, F Alliance
FIDO Alliance Proposed Standard, 1-5, 2015
792015
Defeating Encrypted and Deniable File Systems: TrueCrypt v5. 1a and the Case of the Tattling OS and Applications.
A Czeskis, DJS Hilaire, K Koscher, SD Gribble, T Kohno, B Schneier
HotSec, 2008
672008
Origin cookies: Session integrity for web applications
A Bortz, A Barth, A Czeskis
Web 2.0 Security and Privacy (W2SP), 2011
612011
Lightweight server support for browser-based CSRF protection
A Czeskis, A Moshchuk, T Kohno, HJ Wang
Proceedings of the 22nd international conference on World Wide Web, 273-284, 2013
412013
Security Keys: Practical Cryptographic Second Factors for the Modern Web
J Lang, A Czeskis, D Balfanz, M Schilder, S Srinivas
Twentieth International Conference on Financial Cryptography and Data Security, 2016
352016
FIDO NFC Protocol Specification v1. 0
A Czeskis, J Lang
FIDO Alliance Proposed Standard, 1-5, 2015
342015
St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, and Bruce Schneier, Defeating Encrypted and Deniable File Systems: TrueCrypt v5. 1a and the Case of the Tattling …
A Czeskis, J David
Proceedings of the 3rd conference on Hot topics in security, 1-7, 2008
272008
Auto-user registration and unlocking of a computing device
J Woodward, JP Civelli, D Balfanz, M Fucci, A Czeskis, S Nishit, K Liu, ...
US Patent 9,276,914, 2016
172016
Traceable and automatic compliance of privacy policies in federated digital identity management
A Squicciarini, A Bhargav-Spantzel, A Czeskis, E Bertino
International Workshop on Privacy Enhancing Technologies, 78-98, 2006
142006
Protected login
A Czeskis, D Balfanz
International Conference on Financial Cryptography and Data Security, 44-52, 2012
122012
Radio frequency identification secret handshakes
T Kohno, A Czeskis, K Koscher, JR Smith
US Patent 8,643,475, 2014
112014
Privacy policies compliance across digital identity management systems
AC Squicciarini, A Czeskis, A Bhargav-Spantzel
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on …, 2008
52008
The Transfer Access Protocol-Moving to New Authenticators in the FIDO Ecosystem
A Takakuwa, T Kohno, A Czeskis
Technical Report UW-CSE-17–06-01, 2017
32017
FIDO 2.0: Web API for accessing FIDO 2.0 credentials
H Le Van Gong, D Balfanz, A Czeskis, A Birgisson, J Hodges
World Wide Web Consortium (W3C) Member Submission, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–20