scispace - formally typeset
T

Tadayoshi Kohno

Researcher at University of Washington

Publications -  236
Citations -  20751

Tadayoshi Kohno is an academic researcher from University of Washington. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 66, co-authored 213 publications receiving 18044 citations. Previous affiliations of Tadayoshi Kohno include University of California, Berkeley & Cigital.

Papers
More filters

Provably Fixing the SSH Binary Packet Protocol

TL;DR: This paper proposes several fixes to the SSH protocol and, using techniques from modern cryptography, proves that their modified versions of SSH meet strong new chosen-ciphertext privacy and integrity requirements.
Journal Article

Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships

TL;DR: The authors studied videos posted on TikTok that give advice for how to surveil or control others through technology, focusing on two interpersonal contexts: intimate partner relationships and parent-child relationships.
Book ChapterDOI

On the Global Content PMI: Improved Copy-Protected Internet Content Distribution

TL;DR: A solution is proposed that reduces a content distributor's risk of piracy and raises the notion and severity of a generic attack in the context of Adams and Zuccherato's Privilege Management Infrastructure.
Posted Content

Augmented Reality: Hard Problems of Law and Policy

TL;DR: In this paper, the authors describe their vision of AR and explore the unique and difficult problems AR presents for law and policy, including privacy, free speech, discrimination, and safety.

Per-App Profiles with AppFork: The Security of Two Phones with the Convenience of One

TL;DR: AppFork is proposed, an Android-based platform which allows users to switch a single app from one active profile to another without switching the active profile of all other apps, and achieves the security of virtualization-based approaches, but with a smaller overhead.