Search Results for author: Shweta Shinde

Found 4 papers, 1 papers with code

Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones

no code implementations4 Feb 2021 Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun

The majority of smartphones either run iOS or Android operating systems.

Cryptography and Security

Practical Verifiable In-network Filtering for DDoS defense

1 code implementation4 Jan 2019 Deli Gong, Muoi Tran, Shweta Shinde, Hao Jin, Vyas Sekar, Prateek Saxena, Min Suk Kang

In this paper, we show the technical feasibility of verifiable in-network filtering, called VIF, that offers filtering verifiability to DDoS victims and neighbor ASes.

Cryptography and Security

Privado: Practical and Secure DNN Inference with Enclaves

no code implementations1 Oct 2018 Karan Grover, Shruti Tople, Shweta Shinde, Ranjita Bhagwan, Ramachandran Ramjee

In this paper, we ask a timely question: "Can third-party cloud services use Intel SGX enclaves to provide practical, yet secure DNN Inference-as-a-service?"

Cannot find the paper you are looking for? You can Submit a new open access paper.