N.P. Hoang, I. Lin, S. Ghavamnia, M. Polychronakis
K-resolver: Towards Decentralizing Encrypted DNS Resolution
View More Papers
Lightnion: seamless anonymous communication from any web browser
Wouter Lueks, Matthieu Daumas, Carmela Troncoso
Read MoreWhat the Fork? Finding and Analyzing Malware in GitHub...
Alan Cao (New York University) and Brendan Dolan-Gavitt (New York University)
Read MoreDetecting Tor Bridge from Sampled Traffic in Backbone Networks
Hua Wu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration Southeast University, Ministry of Education, Jiangsu Nanjing, Purple Mountain Laboratories for Network and Communication Security (Nanjing, Jiangsu)), Shuyi Guo, Guang Cheng, Xiaoyan Hu (School of Cyber Science & Engineering and Key Laboratory of Computer Network and Information Integration…
Read More[WITHDRAWN] First, Do No Harm: Studying the manipulation of...
Shubham Agarwal (Saarland University), Ben Stock (CISPA Helmholtz Center for Information Security)
Read More