Billy Bob Brumley
Orcid: 0000-0001-9160-0463Affiliations:
- Rochester Institute of Technology, NY, USA
- Tampere University, Finland (former)
According to our database1,
Billy Bob Brumley
authored at least 45 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Investigating child sexual abuse material availability, searches, and users on the anonymous Tor network for a public health intervention strategy.
CoRR, 2024
2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
2021
A formula for disaster: a unified approach to elliptic curve special-point-based attacks.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Int. J. Parallel Program., 2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2016
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 20th IEEE Symposium on Computer Arithmetic, 2011
2010
IEEE Trans. Computers, 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
Proceedings of the Progress in Cryptology, 2009
2008
Proceedings of the Public Key Infrastructure, 2008
Implementing Cryptography for Packet Level Authentication.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the Information Security, 10th International Conference, 2007
2006
Left-to-Right Signed-Bit <i>tau</i>-Adic Representations of <i>n</i> Integers (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006