S. Hollenbeck, B. Kalinski (Verisign)
A Balanced DNS Information Protection Strategy: Minimize at Root and TLD, Encrypt When Needed Elsewhere
View More Papers
Zoom on the Keystrokes: Exploiting Video Calls for Keystroke...
Mohd Sabra (University of Texas at San Antonio), Anindya Maiti (University of Oklahoma), Murtuza Jadliwala (University of Texas at San Antonio)
Read MorePractical Non-Interactive Searchable Encryption with Forward and Backward Privacy
Shi-Feng Sun (Monash University, Australia), Ron Steinfeld (Monash University, Australia), Shangqi Lai (Monash University, Australia), Xingliang Yuan (Monash University, Australia), Amin Sakzad (Monash University, Australia), Joseph Liu (Monash University, Australia), Surya Nepal (Data61, CSIRO, Australia), Dawu Gu (Shanghai Jiao Tong University, China)
Read MoreCROW: Code Diversification for WebAssembly
Javier Cabrera Arteaga, Orestis Floros, Benoit Baudry, Martin Monperrus (KTH Royal Institute of Technology), Oscar Vera Perez (Univ Rennes, Inria, CNRS, IRISA)
Read MorePractical Blind Membership Inference Attack via Differential Comparisons
Bo Hui (The Johns Hopkins University), Yuchen Yang (The Johns Hopkins University), Haolin Yuan (The Johns Hopkins University), Philippe Burlina (The Johns Hopkins University Applied Physics Laboratory), Neil Zhenqiang Gong (Duke University), Yinzhi Cao (The Johns Hopkins University)
Read More