Aritra Dhar
Aritra Dhar
Huawei Zurich Research Center
Verified email at - Homepage
Cited by
Cited by
{ROTE}: Rollback protection for trusted execution
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
26th USENIX Security Symposium (USENIX Security 17), 1289-1306, 2017
Increasing anonymity in bitcoin
A Saxena, J Misra, A Dhar
International Conference on Financial Cryptography and Data Security, 122-139, 2014
Proximitee: Hardened sgx attestation by proximity verification
A Dhar, I Puddu, K Kostiainen, S Capkun
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
Snappy: Fast on-chain payments with practical collaterals
V Mavroudis, K Wüst, A Dhar, K Kostiainen, S Capkun
arXiv preprint arXiv:2001.01278, 2020
CLOTHO: Saving Programs from Malformed Strings and Incorrect String-handling
A Dhar, R Purandare, M Dhawan, S R
ESEC/FSE 2015 Proceedings of the 2015 10th Joint Meeting on Foundations of …, 2015
100% connectivity for location aware code based KPD in clustered WSN: merging blocks
S Bag, A Dhar, P Sarkar
International Conference on Information Security, 136-150, 2012
PROTECTION: Root-of-Trust for IO in Compromised Platforms
A Dhar, E Ulqinaku, K Kostiainen, S Capkun
Methods and systems for broadcasting targeted advertisements to mobile device
S Vaya
US Patent 10,333,909, 2019
Proximitee: Hardened sgx attestation and trusted path through proximity verification
A Dhar, I Puddu, K Kostianen, S Capkun
ETH Zurich, 2018
Integrikey: End-to-end integrity protection of user input
A Dhar, DY Yu, K Kostiainen, S Capkun
Cryptology ePrint Archive, 2017
TactBack VibroTactile braille output using smartphone and smartwatch for visually impaired
A Dhar, A Nittala, K Yadav
Proceedings of the 13th International Web for All Conference, 1-2, 2016
Dedicated Security Chips in the Age of Secure Enclaves
K Kostiainen, A Dhar, S Capkun
IEEE Security & Privacy, 2020
Privacy-preserving targeted advertising
T Tulabandhula, S Vaya, A Dhar
arXiv preprint arXiv:1710.03275, 2017
ROTE: Rollback protection for trusted execution, 2017
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
Full communication in a wireless sensor network by merging blocks of a key predistribution using reed solomon code
A Dhar, P Sarkar
Proceedings of CCSEA, 389-400, 2011
Composite Enclaves: Towards Disaggregated Trusted Execution
M Schneider, A Dhar, I Puddu, K Kostiainen, S Capkun
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (1), 2022
Methods and systems for interaction with digital signage board
S Vaya, BS Solanki, A Singh, S Sharma, N Pande, G Manjunath
US Patent 10,489,824, 2019
Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging
P Sarkar, BK Rai, A Dhar
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc …, 2013
Systems and methods for privacy preserving recommendation of items
S Vaya, T Tulabandhula
US Patent App. 15/417,274, 2018
Anonymous Communication for Messengers via
D Sommer, A Dhar, L Malitsa, E Mohammadi, D Ronzani, S Capkun
Forced” Participation,” Technical report, available under https://eprint …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20