Sebastian Meiser, Debajyoti Das, Moritz Kirschte, Esfandiar Mohammadi, Aniket Kate
Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary
View More Papers
“Do We Call Them That? Absolutely Not.”: Juxtaposing the...
Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Luca Favaro (Technical University of Munich), and Florian Matthes (Technical University of Munich)
Read MoreScale-MIA: A Scalable Model Inversion Attack against Secure Federated...
Shanghao Shi (Virginia Tech), Ning Wang (University of South Florida), Yang Xiao (University of Kentucky), Chaoyu Zhang (Virginia Tech), Yi Shi (Virginia Tech), Y. Thomas Hou (Virginia Polytechnic Institute and State University), Wenjing Lou (Virginia Polytechnic Institute and State University)
Read MoreAnalysis of Misconfigured IoT MQTT Deployments and a Lightweight...
Seyed Ali Ghazi Asgar, Narasimha Reddy (Texas A&M University)
Read More