Aritra Dhar
TitleCited byYear
{ROTE}: Rollback protection for trusted execution
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 1289-1306, 2017
Increasing anonymity in bitcoin
A Saxena, J Misra, A Dhar
International Conference on Financial Cryptography and Data Security, 122-139, 2014
100% connectivity for location aware code based KPD in clustered WSN: merging blocks
S Bag, A Dhar, P Sarkar
International Conference on Information Security, 136-150, 2012
ROTE: Rollback protection for trusted execution, 2017
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
Full communication in a wireless sensor network by merging blocks of a key predistribution using reed solomon code
A Dhar, P Sarkar
Proceedings of CCSEA, 389-400, 2011
CLOTHO: Saving Programs from Malformed Strings and Incorrect String-handling
A Dhar, R Purandare, M Dhawan, S R
ESEC/FSE 2015 Proceedings of the 2015 10th Joint Meeting on Foundations of …, 2015
Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging
P Sarkar, BK Rai, A Dhar
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc …, 2013
TactBack VibroTactile braille output using smartphone and smartwatch for visually impaired
A Dhar, A Nittala, K Yadav
Proceedings of the 13th Web for All Conference, 1-2, 2016
CoverUp: Privacy Through" Forced" Participation in Anonymous Communication Networks.
D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun
IACR Cryptology ePrint Archive 2017, 191, 2017
Assured full communication by merging blocks randomly in wireless sensor networks using Reed Solomon code for key predistribution
P Sarkar, A Dhar
Int. J. Netw. Secur. Appl 3, 203-215, 2011
Proximitee: Hardened sgx attestation and trusted path through proximity verification
A Dhar, I Puddu, K Kostianen, S Capkun
ETH Zurich, 2018
Privacy-preserving Targeted Advertising
T Tulabandhula, S Vaya, A Dhar
arXiv preprint arXiv:1710.03275, 2017
Snappy: Fast On-chain Payments with Practical Collaterals
V Mavroudis, K Wüst, A Dhar, K Kostiainen, S Capkun
arXiv preprint arXiv:2001.01278, 2020
PROTECTION: Root-of-Trust for IO in Compromised Platforms
A Dhar, E Ulqinaku, K Kostiainen, S Capkun
Methods and systems for interaction with digital signage board
S Vaya, BS Solanki, A Singh, S Sharma, N Pande, G Manjunath
US Patent 10,489,824, 2019
Methods and systems for broadcasting targeted advertisements to mobile device
S Vaya
US Patent 10,333,909, 2019
Method and system for receiving targeted content
A Singh, G Manjunath, S Vaya, BS Solanki, S Sharma
US Patent 10,311,480, 2019
Deniable upload and download via passive participation
D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun
16th {USENIX} Symposium on Networked Systems Design and Implementation …, 2019
METIS: Resource and Context-Aware Monitoring of Finite State Properties
G Allabadi, A Dhar, A Bashir, R Purandare
International Conference on Runtime Verification, 167-186, 2018
INTEGRIKEY: Integrity Protection of User Input for Remote Configuration of Safety-Critical Devices
A Dhar, DY Yu, K Kostiainen
The system can't perform the operation now. Try again later.
Articles 1–20