Cited By
View all- Gröber LMrowczynski RVijay NMuller DDabrowski AKrombholz KCalandrino JTroncoso C(2023)To cloud or not to cloudProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620377(2491-2508)Online publication date: 9-Aug-2023
- Arora SAtrey P(2021)Secure Collaborative Editing Using Secret Sharing2021 IEEE International Workshop on Information Forensics and Security (WIFS)10.1109/WIFS53200.2021.9648395(1-6)Online publication date: 7-Dec-2021
- Mohsin HBahjat H(2019)Anti-screenshot Keyboard for Web-Based Application Using CloakingProceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol.110.1007/978-3-030-21005-2_45(473-478)Online publication date: 11-Jul-2019
- Show More Cited By