An IBE-based Signcryption Scheme for Group Key Management. | 0 | 0.34 | 2016 |
Insecure Surveillance: Technical Issues with Remote Computer Searches. | 0 | 0.34 | 2016 |
Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy. | 0 | 0.34 | 2015 |
Keys under doormats: mandating insecurity by requiring government access to all data and communications. | 9 | 0.70 | 2015 |
Keys under doormats | 10 | 0.85 | 2015 |
The design and implementation of the A3 application-aware anonymity platform | 1 | 0.35 | 2014 |
Privacy-aware message exchanges for HumaNets. | 3 | 0.37 | 2014 |
Moving Targets: Security and Rapid-Release in Firefox | 3 | 0.39 | 2014 |
Going Bright: Wiretapping without Weakening Communications Infrastructure | 4 | 0.46 | 2013 |
The casino and the OODA loop: why our protocols always eventually fail | 0 | 0.34 | 2012 |
Practicality of accelerometer side channels on smartphones | 39 | 1.19 | 2012 |
Collaborative red teaming for anonymity system evaluation | 0 | 0.34 | 2012 |
The casino and the OODA loop: why our protocols always eventually fail (transcript of discussion) | 0 | 0.34 | 2012 |
Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. | 8 | 0.55 | 2012 |
One-Way cryptography | 1 | 0.49 | 2011 |
One-Way cryptography (transcript of discussion) | 0 | 0.34 | 2011 |
Why (special agent) Johnny (still) can't encrypt: a security analysis of the APCO project 25 two-way radio system | 18 | 1.21 | 2011 |
Key escrow from a safe distance: looking back at the Clipper Chip | 2 | 0.37 | 2011 |
Evading cellular data monitoring with human movement networks | 6 | 0.50 | 2010 |
Smudge Attacks on Smartphone Touch Screens. | 0 | 0.34 | 2010 |
Smudge attacks on smartphone touch screens | 211 | 9.70 | 2010 |
Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities | 14 | 0.94 | 2010 |
A3: An Extensible Platform for Application-Aware Anonymity. | 18 | 0.73 | 2010 |
Blood in the Water - Are there Honeymoon Effects Outside Software? | 2 | 0.43 | 2010 |
QuanTM: a quantitative trust management system | 10 | 0.59 | 2009 |
Can they hear me now?: a security analysis of law enforcement wiretaps | 2 | 0.53 | 2009 |
Scalable Link-Based Relay Selection for Anonymous Routing | 25 | 0.93 | 2009 |
Anonymity in Wireless Broadcast Networks | 9 | 0.58 | 2009 |
Below the Salt. | 0 | 0.34 | 2009 |
Is the Honeymoon over? | 0 | 0.34 | 2009 |
Dynamic Trust Management | 11 | 1.75 | 2009 |
Application containers without virtual machines | 4 | 0.38 | 2009 |
Veracity: practical secure network coordinates via vote-based agreements | 23 | 0.79 | 2009 |
Taking Surveillance Out of the Shadows | 8 | 0.68 | 2009 |
Veracity: a fully decentralized service for securing network coordinate systems | 14 | 0.78 | 2008 |
On the (un)reliability of eavesdropping | 9 | 0.47 | 2008 |
Security evaluation of ES&S voting machines and election management system | 14 | 0.94 | 2008 |
Bridging the gap between vulnerabilities and threats in electronic voting (transcript of discussion) | 0 | 0.34 | 2008 |
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract. | 0 | 0.34 | 2008 |
Internal surveillance, external risks | 1 | 0.35 | 2007 |
Towards application-aware anonymous routing | 9 | 0.62 | 2007 |
Security Protocols with Isotropic Channels. | 0 | 0.34 | 2006 |
Sensor network security: more interesting than you think | 6 | 0.55 | 2006 |
Keyboards and covert channels | 68 | 3.05 | 2006 |
The real national-security needs for VoIP | 4 | 0.61 | 2005 |
Signaling vulnerabilities in wiretapping systems | 12 | 1.21 | 2005 |
Listen too closely and you may be confused | 3 | 0.41 | 2005 |
Listen Too Closely and You May Be Confused | 2 | 0.39 | 2005 |
Picking Locks with Cryptology | 0 | 0.34 | 2005 |
Just fast keying: Key agreement in a hostile internet | 56 | 3.57 | 2004 |