Alexei Czeskis
Alexei Czeskis
Securineer, Google
Verified email at czeskis.com - Homepage
Title
Cited by
Cited by
Year
Experimental security analysis of a modern automobile
K Koscher, S Savage, F Roesner, S Patel, T Kohno, A Czeskis, D McCoy, ...
2010 IEEE Symposium on Security and Privacy, 447-462, 2010
17622010
Comprehensive experimental analyses of automotive attack surfaces.
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
USENIX Security Symposium 4, 447-462, 2011
15542011
Strengthening user authentication through opportunistic cryptographic identity assertions
A Czeskis, M Dietz, T Kohno, D Wallach, D Balfanz
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
142*2012
RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
A Czeskis, K Koscher, JR Smith, T Kohno
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1132008
Parenting from the pocket: Value tensions and technical directions for secure and private parent-teen mobile safety
A Czeskis, I Dermendjieva, H Yapit, A Borning, B Friedman, B Gill, ...
Proceedings of the sixth symposium on usable privacy and security, 1-15, 2010
1092010
Origin-bound certificates: A fresh approach to strong client authentication for the web
M Dietz, A Czeskis, D Balfanz, DS Wallach
21st {USENIX} Security Symposium ({USENIX} Security 12), 317-331, 2012
1042012
Universal 2nd factor (U2F) overview
S Srinivas, D Balfanz, E Tiffany, A Czeskis, F Alliance
FIDO Alliance Proposed Standard 15, 2015
962015
Defeating Encrypted and Deniable File Systems: TrueCrypt v5. 1a and the Case of the Tattling OS and Applications.
A Czeskis, DJS Hilaire, K Koscher, SD Gribble, T Kohno, B Schneier
HotSec, 2008
732008
Origin cookies: Session integrity for web applications
A Bortz, A Barth, A Czeskis
Web 2.0 Security and Privacy (W2SP), 2011
682011
Security Keys: Practical Cryptographic Second Factors for the Modern Web
J Lang, A Czeskis, D Balfanz, M Schilder, S Srinivas
Twentieth International Conference on Financial Cryptography and Data Security, 2016
512016
Lightweight server support for browser-based CSRF protection
A Czeskis, A Moshchuk, T Kohno, HJ Wang
Proceedings of the 22nd international conference on World Wide Web, 273-284, 2013
492013
Auto-user registration and unlocking of a computing device
J Woodward, JP Civelli, D Balfanz, M Fucci, A Czeskis, S Nishit, K Liu, ...
US Patent 9,276,914, 2016
352016
Fido nfc protocol specification v1. 0
A Czeskis, J Lang
FIDO Alliance Proposed Standard, 1-5, 2015
292015
St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, and Bruce Schneier, Defeating Encrypted and Deniable File Systems: TrueCrypt v5. 1a and the Case of the Tattling …
A Czeskis, J David
Proceedings of the 3rd Conference on Hot Topics in Security, 7, 2008
162008
Traceable and automatic compliance of privacy policies in federated digital identity management
A Squicciarini, A Bhargav-Spantzel, A Czeskis, E Bertino
International Workshop on Privacy Enhancing Technologies, 78-98, 2006
152006
Radio frequency identification secret handshakes
T Kohno, A Czeskis, K Koscher, JR Smith
US Patent 8,643,475, 2014
142014
The High Cost of Free Services: Problems with Surveillance Capitalism and Possible Alternatives for IT Infrastructure
M Landwehr, A Borning, V Wulf
Proceedings of the Fifth Workshop on Computing within Limits, 1-10, 2019
122019
Protected login
A Czeskis, D Balfanz
International Conference on Financial Cryptography and Data Security, 44-52, 2012
122012
Privacy policies compliance across digital identity management systems
AC Squicciarini, A Czeskis, A Bhargav-Spantzel
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on …, 2008
62008
Web authentication: An API for accessing public key credentials
D Balfanz, A Czeskis, J Hodges, JJC Jones, MB Jones, A Kumar, A Liao, ...
tech. rep., W3C Recommendation, 2019
52019
The system can't perform the operation now. Try again later.
Articles 1–20