Daniel Kahn Gillmor (ACLU)
Keynote: Armor for the back half of the camel: Why confidentiality matters for recursive DNS traffic
View More Papers
Scenario-Driven Assessment of Cyber Risk Perception at the Security...
Simon Parkin (TU Delft), Kristen Kuhn, Siraj Ahmed Shaikh (Coventry University)
Read MoreFrom WHOIS to WHOWAS: A Large-Scale Measurement Study of...
Chaoyi Lu (Tsinghua University; Beijing National Research Center for Information Science and Technology), Baojun Liu (Tsinghua University; Beijing National Research Center for Information Science and Technology; Qi An Xin Group), Yiming Zhang (Tsinghua University; Beijing National Research Center for Information Science and Technology), Zhou Li (University of California, Irvine), Fenglu Zhang (Tsinghua University), Haixin Duan…
Read MoreVision-Based Two-Factor Authentication & Localization Scheme for Autonomous Vehicles
Anas Alsoliman, Marco Levorato, and Qi Alfred Chen (UC Irvine)
Read MoreYour Phone is My Proxy: Detecting and Understanding Mobile...
Xianghang Mi (University at Buffalo), Siyuan Tang (Indiana University Bloomington), Zhengyi Li (Indiana University Bloomington), Xiaojing Liao (Indiana University Bloomington), Feng Qian (University of Minnesota Twin Cities), XiaoFeng Wang (Indiana University Bloomington)
Read More