Sebastian Meiser, Debajyoti Das, Moritz Kirschte, Esfandiar Mohammadi, Aniket Kate
Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary
View More Papers
Understanding Influences on SMS Phishing Detection: User Behavior, Demographics,...
Daniel Timko (California State University San Marcos), Daniel Hernandez Castillo (California State University San Marcos), Muhammad Lutfor Rahman (California State University San Marcos)
Read MoreSecure Data Analytics in Apache Spark with Fine-grained Policy...
Byeongwook Kim (Seoul National University), Jaewon Hur (Seoul National University), Adil Ahmad (Arizona State University), Byoungyoung Lee (Seoul National University)
Read MoreThe Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy...
Diwen Xue (University of Michigan), Robert Stanley (University of Michigan), Piyush Kumar (University of Michigan), Roya Ensafi (University of Michigan)
Read MoreAnalysis of Misconfigured IoT MQTT Deployments and a Lightweight...
Seyed Ali Ghazi Asgar, Narasimha Reddy (Texas A&M University)
Read More