Aritra Dhar
Aritra Dhar
Huawei Zurich Research Center
Verified email at - Homepage
Cited by
Cited by
{ROTE}: Rollback protection for trusted execution
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 1289-1306, 2017
Increasing anonymity in bitcoin
A Saxena, J Misra, A Dhar
International Conference on Financial Cryptography and Data Security, 122-139, 2014
CLOTHO: Saving Programs from Malformed Strings and Incorrect String-handling
A Dhar, R Purandare, M Dhawan, S R
ESEC/FSE 2015 Proceedings of the 2015 10th Joint Meeting on Foundations of …, 2015
100% connectivity for location aware code based KPD in clustered WSN: merging blocks
S Bag, A Dhar, P Sarkar
International Conference on Information Security, 136-150, 2012
ProximiTEE: Hardened SGX attestation by proximity verification
A Dhar, I Puddu, K Kostiainen, S Capkun
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
Proximitee: Hardened sgx attestation and trusted path through proximity verification
A Dhar, I Puddu, K Kostianen, S Capkun
ETH Zurich, 2018
Snappy: Fast on-chain payments with practical collaterals
V Mavroudis, K Wüst, A Dhar, K Kostiainen, S Capkun
arXiv preprint arXiv:2001.01278, 2020
Methods and systems for broadcasting targeted advertisements to mobile device
S Vaya
US Patent 10,333,909, 2019
PROTECTION: Root-of-Trust for IO in Compromised Platforms
A Dhar, E Ulqinaku, K Kostiainen, S Capkun
IntegriKey: End-to-End Integrity Protection of User Input.
A Dhar, DY Yu, K Kostiainen, S Capkun
IACR Cryptol. ePrint Arch. 2017, 1245, 2017
ROTE: Rollback protection for trusted execution, 2017
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
Full communication in a wireless sensor network by merging blocks of a key predistribution using reed solomon code
A Dhar, P Sarkar
Proceedings of CCSEA, 389-400, 2011
Privacy-preserving targeted advertising
T Tulabandhula, S Vaya, A Dhar
arXiv preprint arXiv:1710.03275, 2017
Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging
P Sarkar, BK Rai, A Dhar
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc …, 2013
Anonymous Communication for Messengers via “Forced” Participation
D Sommer, A Dhar, L Malitsa, E Mohammadi, D Ronzani, S Capkun
Technical report, available under https://eprint. iacr. org/2017/191, 2017
TactBack VibroTactile braille output using smartphone and smartwatch for visually impaired
A Dhar, A Nittala, K Yadav
Proceedings of the 13th International Web for All Conference, 1-2, 2016
Pie: A dynamic tcb for remote systems with a platform isolation environment
M Schneider, A Dhar, I Puddu, K Kostiainen, S Capkun
arXiv e-prints, arXiv: 2010.10416, 2020
Methods and systems for providing non-auditory feedback to users
K Yadav
US Patent App. 15/607,804, 2018
Systems and methods for privacy preserving recommendation of items
S Vaya, T Tulabandhula
US Patent App. 15/417,274, 2018
CoverUp: Privacy Through" Forced" Participation in Anonymous Communication Networks
D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun
Cryptology ePrint Archive, 2017
The system can't perform the operation now. Try again later.
Articles 1–20