Follow
Aritra Dhar
Aritra Dhar
Huawei Zurich Research Center
Verified email at huawei.com - Homepage
Title
Cited by
Cited by
Year
{ROTE}: Rollback protection for trusted execution
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
26th USENIX Security Symposium (USENIX Security 17), 1289-1306, 2017
2422017
Increasing anonymity in bitcoin
A Saxena, J Misra, A Dhar
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014
692014
Snappy: Fast on-chain payments with practical collaterals
V Mavroudis, K Wüst, A Dhar, K Kostiainen, S Capkun
arXiv preprint arXiv:2001.01278, 2020
242020
Proximitee: Hardened sgx attestation by proximity verification
A Dhar, I Puddu, K Kostiainen, S Capkun
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
232020
PROTECTION: Root-of-Trust for IO in Compromised Platforms
A Dhar, E Ulqinaku, K Kostiainen, S Capkun
182020
CLOTHO: Saving Programs from Malformed Strings and Incorrect String-handling
A Dhar, R Purandare, M Dhawan, S R
ESEC/FSE 2015 Proceedings of the 2015 10th Joint Meeting on Foundations of …, 2015
152015
Methods and systems for broadcasting targeted advertisements to mobile device
D Aritra, S Vaya
US Patent 10,333,909, 2019
132019
100% connectivity for location aware code based KPD in clustered WSN: merging blocks
S Bag, A Dhar, P Sarkar
Information Security: 15th International Conference, ISC 2012, Passau …, 2012
122012
Composite Enclaves: Towards Disaggregated Trusted Execution
M Schneider, A Dhar, I Puddu, K Kostiainen, S Capkun
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (1), 2022
112022
TactBack VibroTactile braille output using smartphone and smartwatch for visually impaired
A Dhar, A Nittala, K Yadav
Proceedings of the 13th international web for all conference, 1-2, 2016
112016
Dedicated Security Chips in the Age of Secure Enclaves
K Kostiainen, A Dhar, S Capkun
IEEE Security & Privacy, 2020
102020
Method and system for receiving targeted content
A Singh, G Manjunath, S Vaya, BS Solanki, S Sharma, D Aritra
US Patent 10,311,480, 2019
82019
Proximitee: Hardened sgx attestation and trusted path through proximity verification
A Dhar, I Puddu, K Kostianen, S Capkun
ETH Zurich, 2018
82018
Methods and systems for interaction with digital signage board
S Vaya, D Aritra, BS Solanki, A Singh, S Sharma, N Pande, G Manjunath
US Patent 10,489,824, 2019
62019
Privacy-preserving targeted advertising
T Tulabandhula, S Vaya, A Dhar
arXiv preprint arXiv:1710.03275, 2017
52017
Integrikey: End-to-end integrity protection of user input
A Dhar, DY Yu, K Kostiainen, S Capkun
Cryptology ePrint Archive, 2017
52017
ROTE: Rollback protection for trusted execution, 2017
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
52017
Systems and methods for privacy preserving recommendation of items
S Vaya, D Aritra, T Tulabandhula
US Patent App. 15/417,274, 2018
42018
Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging
P Sarkar, BK Rai, A Dhar
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc …, 2013
42013
Full communication in a wireless sensor network by merging blocks of a key predistribution using reed solomon code
A Dhar, P Sarkar
Proceedings of CCSEA, 389-400, 2011
42011
The system can't perform the operation now. Try again later.
Articles 1–20