Search filters

List of works by Tadayoshi Kohno

A Review of the Security of Insulin Pump Infusion Systems

scientific article published on November 1, 2011

A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design

scientific article published on 22 December 2023

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent

Breaking and provably repairing the SSH authenticated encryption scheme

scientific article published in 2004

Clinically significant magnetic interference of implanted cardiac devices by portable headphones

scientific article published on 08 July 2009

Computer security for data collection technologies

scientific article published on 01 January 2018

Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions

conference paper published in 2015

DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface

scientific article published in 2021

Evaluation of targeted dataset collection on racial equity in face recognition

scientific article published on 29 August 2023

Experimental Security Analysis of a Modern Automobile

article

Gender Biases in Tone Analysis: A Case Study of a Commercial Wearable

Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive

Herding Hash Functions and the Nostradamus Attack

article

Improving the security and privacy of implantable medical devices.

scientific article published in April 2010

Internet Censorship in Thailand: User Practices and Potential Threats

scholarly article published April 2017

MyTime

article published in 2016

Neurosecurity: security and privacy for neural devices

scientific article

Online Advertising in Ukraine and Russia During the 2022 Russian Invasion

scientific article published on 26 April 2023

PO-631-01 TELEROBOTIC CARDIAC CATHETER ABLATION IN A RURAL HOSPITAL: A PROOF-OF-CONCEPT SIMULATION STUDY

scientific article published in 2022

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

article

Privacy oracle

scientific article published in 2008

Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution

scientific article published in 2018

Robust Physical-World Attacks on Deep Learning Models

scholarly article published 13 September 2017

SeaGlass: Enabling City-Wide IMSI-Catcher Detection

journal article from 'Proceedings on Privacy Enhancing Technologies' published in 2017

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

article

Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages

article

Shining Light in Dark Places: Understanding the Tor Network

The Use and Non-Use of Technology During Hurricanes

scientific article published on 04 October 2023

Token-based scanning of source code for security problems

scientific article

Who's in and who's out? A case study of multimodal CLIP-filtering in DataComp

scientific article published on 23 October 2024