Aritra Dhar
Aritra Dhar
Huawei Zurich Research Center
Verified email at - Homepage
Cited by
Cited by
{ROTE}: Rollback protection for trusted execution
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
26th USENIX Security Symposium (USENIX Security 17), 1289-1306, 2017
Increasing anonymity in bitcoin
A Saxena, J Misra, A Dhar
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014
Snappy: Fast on-chain payments with practical collaterals
V Mavroudis, K Wüst, A Dhar, K Kostiainen, S Capkun
arXiv preprint arXiv:2001.01278, 2020
Proximitee: Hardened sgx attestation by proximity verification
A Dhar, I Puddu, K Kostiainen, S Capkun
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
PROTECTION: Root-of-Trust for IO in Compromised Platforms
A Dhar, E Ulqinaku, K Kostiainen, S Capkun
CLOTHO: Saving Programs from Malformed Strings and Incorrect String-handling
A Dhar, R Purandare, M Dhawan, S R
ESEC/FSE 2015 Proceedings of the 2015 10th Joint Meeting on Foundations of …, 2015
Composite Enclaves: Towards Disaggregated Trusted Execution
M Schneider, A Dhar, I Puddu, K Kostiainen, S Capkun
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (1), 2022
TactBack VibroTactile braille output using smartphone and smartwatch for visually impaired
A Dhar, A Nittala, K Yadav
Proceedings of the 13th international web for all conference, 1-2, 2016
100% connectivity for location aware code based KPD in clustered WSN: merging blocks
S Bag, A Dhar, P Sarkar
Information Security: 15th International Conference, ISC 2012, Passau …, 2012
Dedicated Security Chips in the Age of Secure Enclaves
K Kostiainen, A Dhar, S Capkun
IEEE Security & Privacy, 2020
Method and system for receiving targeted content
A Singh, G Manjunath, S Vaya, BS Solanki, S Sharma, D Aritra
US Patent 10,311,480, 2019
Proximitee: Hardened sgx attestation and trusted path through proximity verification
A Dhar, I Puddu, K Kostianen, S Capkun
ETH Zurich, 2018
Methods and systems for interaction with digital signage board
S Vaya, D Aritra, BS Solanki, A Singh, S Sharma, N Pande, G Manjunath
US Patent 10,489,824, 2019
Privacy-preserving targeted advertising
T Tulabandhula, S Vaya, A Dhar
arXiv preprint arXiv:1710.03275, 2017
Integrikey: End-to-end integrity protection of user input
A Dhar, DY Yu, K Kostiainen, S Capkun
Cryptology ePrint Archive, 2017
ROTE: Rollback protection for trusted execution, 2017
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
Empowering data centers for next generation trusted computing
A Dhar, S Sridhara, S Shinde, S Capkun, R Andri
arXiv preprint arXiv:2211.00306, 2022
Pie: A dynamic tcb for remote systems with a platform isolation environment
M Schneider, A Dhar, I Puddu, K Kostiainen, S Capkun
arXiv preprint arXiv:2010.10416, 2020
Systems and methods for privacy preserving recommendation of items
S Vaya, D Aritra, T Tulabandhula
US Patent App. 15/417,274, 2018
Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging
P Sarkar, BK Rai, A Dhar
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20