Vijay k. Gurbani and Cynthia Hood ( Illinois Institute of Technology), Anita Nikolich (University of Illinois), Henning Schulzrinne (Columbia University) and Radu State (University of Luxembourg)
When DNS Goes Dark: Understanding Privacy and Shaping Policy of an Evolving Protocol
View More Papers
Shadow Attacks: Hiding and Replacing Content in Signed PDFs
Christian Mainka (Ruhr University Bochum), Vladislav Mladenov (Ruhr University Bochum), Simon Rohlmann (Ruhr University Bochum)
Read MoreA Formal Analysis of the FIDO UAF Protocol
Haonan Feng (Beijing University of Posts and Telecommunications), Hui Li (Beijing University of Posts and Telecommunications), Xuesong Pan (Beijing University of Posts and Telecommunications), Ziming Zhao (University at Buffalo)
Read MoreUnderstanding Worldwide Private Information Collection on Android
Yun Shen (NortonLifeLock Research Group), Pierre-Antoine Vervier (NortonLifeLock Research Group), Gianluca Stringhini (Boston University)
Read MoreLet’s Stride Blindfolded in a Forest: Sublinear Multi-Client Decision...
Jack P. K. Ma (The Chinese University of Hong Kong), Raymond K. H. Tai (The Chinese University of Hong Kong), Yongjun Zhao (Nanyang Technological University), Sherman S.M. Chow (The Chinese University of Hong Kong)
Read More