​
Login / Signup
Alexei Czeskis
ORCID
Publication Activity (10 Years)
Years Active: 2006-2023
Publications (10 Years): 2
Top Topics
Data Security
Encryption Decryption
Security Properties
Statistical Databases
Top Venues
Financial Cryptography
WWW
CHI
</>
Publications
</>
Jackson Stokes
,
Tal August
,
Robert A Marver
,
Alexei Czeskis
,
Franziska Roesner
,
Tadayoshi Kohno
,
Katharina Reinecke
How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance.
CHI
(2023)
Juan Lang
,
Alexei Czeskis
,
Dirk Balfanz
,
Marius Schilder
,
Sampath Srinivas
Security Keys: Practical Cryptographic Second Factors for the Modern Web.
Financial Cryptography
(2016)
Alexei Czeskis
,
Alexander Moshchuk
,
Tadayoshi Kohno
,
Helen J. Wang
Lightweight server support for browser-based CSRF protection.
WWW
(2013)
Alexei Czeskis
,
Dirk Balfanz
Protected Login.
Financial Cryptography Workshops
(2012)
Alexei Czeskis
,
Michael Dietz
,
Tadayoshi Kohno
,
Dan S. Wallach
,
Dirk Balfanz
Strengthening user authentication through opportunistic cryptographic identity assertions.
CCS
(2012)
Michael Dietz
,
Alexei Czeskis
,
Dirk Balfanz
,
Dan S. Wallach
Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web.
USENIX Security Symposium
(2012)
Alexei Czeskis
,
Jacob Appelbaum
High Stakes: Designing a Privacy Preserving Registry.
Financial Cryptography Workshops
(2012)
Stephen Checkoway
,
Damon McCoy
,
Brian Kantor
,
Danny Anderson
,
Hovav Shacham
,
Stefan Savage
,
Karl Koscher
,
Alexei Czeskis
,
Franziska Roesner
,
Tadayoshi Kohno
Comprehensive Experimental Analyses of Automotive Attack Surfaces.
USENIX Security Symposium
(2011)
Karl Koscher
,
Alexei Czeskis
,
Franziska Roesner
,
Shwetak N. Patel
,
Tadayoshi Kohno
,
Stephen Checkoway
,
Damon McCoy
,
Brian Kantor
,
Danny Anderson
,
Hovav Shacham
,
Stefan Savage
Experimental Security Analysis of a Modern Automobile.
IEEE Symposium on Security and Privacy
(2010)
Alexei Czeskis
,
Ivayla Dermendjieva
,
Hussein Yapit
,
Alan Borning
,
Batya Friedman
,
Brian T. Gill
,
Tadayoshi Kohno
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety.
SOUPS
(2010)
Anna Cinzia Squicciarini
,
Alexei Czeskis
,
Abhilasha Bhargav-Spantzel
Privacy policies compliance across digital identity management systems.
SPRINGL
(2008)
Alexei Czeskis
,
David J. St. Hilaire
,
Karl Koscher
,
Steven D. Gribble
,
Tadayoshi Kohno
,
Bruce Schneier
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
HotSec
(2008)
Alexei Czeskis
,
Karl Koscher
,
Joshua R. Smith
,
Tadayoshi Kohno
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
CCS
(2008)
Anna Cinzia Squicciarini
,
Abhilasha Bhargav-Spantzel
,
Alexei Czeskis
,
Elisa Bertino
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Privacy Enhancing Technologies
(2006)