Tariq Elahi
Ensuring Safety and Facilitating Research on the Live Tor Network
View More Papers
Why do Internet Devices Remain Vulnerable? A Survey with...
Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)
Read MoreThe Power of Bamboo: On the Post-Compromise Security for...
Tianyang Chen (Huazhong University of Science and Technology), Peng Xu (Huazhong University of Science and Technology), Stjepan Picek (Radboud University), Bo Luo (The University of Kansas), Willy Susilo (University of Wollongong), Hai Jin (Huazhong University of Science and Technology), Kaitai Liang (TU Delft)
Read MoreVICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests
Yoshimichi Nakatsuka (University of California, Irvine)
Read More