Tariq Elahi
Ensuring Safety and Facilitating Research on the Live Tor Network
View More Papers
Why do Internet Devices Remain Vulnerable? A Survey with...
Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)
Read MoreA Systematic Study of the Consistency of Two-Factor Authentication...
Sanam Ghorbani Lyastani (CISPA Helmholtz Center for Information Security, Saarland University), Michael Backes (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for Information Security)
Read MoreParalyzing Drones via EMI Signal Injection on Sensory Communication...
Joonha Jang (KAIST), ManGi Cho (KAIST), Jaehoon Kim (KAIST), Dongkwan Kim (Samsung SDS), Yongdae Kim (KAIST)
Read More