Aritra Dhar

Orcid: 0000-0002-3023-9368

According to our database1, Aritra Dhar authored at least 24 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Ascend-CC: Confidential Computing on Heterogeneous NPU for Emerging Generative AI Workloads.
CoRR, 2024

2022
Composite Enclaves: Towards Disaggregated Trusted Execution.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Empowering Data Centers for Next Generation Trusted Computing.
CoRR, 2022

2021
Building Trust in Modern Computing Platforms.
PhD thesis, 2021

2020
Dedicated Security Chips in the Age of Secure Enclaves.
IEEE Secur. Priv., 2020

IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients.
CoRR, 2020

PIE: A Dynamic TCB for Remote Systems with a Platform Isolation Environment.
CoRR, 2020

Snappy: Fast On-chain Payments with Practical Collaterals.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

ProximiTEE: Hardened SGX Attestation by Proximity Verification.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
ProtectIOn: Root-of-Trust for IO in Compromised Platforms.
IACR Cryptol. ePrint Arch., 2019

Deniable Upload and Download via Passive Participation.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

Development of UAV Based Glacial Lake Outburst Monitoring System.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

2018
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification.
IACR Cryptol. ePrint Arch., 2018

METIS: Resource and Context-Aware Monitoring of Finite State Properties.
Proceedings of the Runtime Verification - 18th International Conference, 2018

2017
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks.
IACR Cryptol. ePrint Arch., 2017

ROTE: Rollback Protection for Trusted Execution.
IACR Cryptol. ePrint Arch., 2017

IntegriKey: End-to-End Integrity Protection of User Input.
IACR Cryptol. ePrint Arch., 2017

Privacy-preserving Targeted Advertising.
CoRR, 2017

2016
TactBack: VibroTactile braille output using smartphone and smartwatch for visually impaired.
Proceedings of the 13th Web for All Conference, 2016

2015
CLOTHO: saving programs from malformed strings and incorrect string-handling.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

2014
Increasing Anonymity in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013

Code Based KPD Scheme with Full Connectivity: Deterministic Merging.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks.
Proceedings of the Information Security - 15th International Conference, 2012


  Loading...