IEEE

Results: 22018



#Item
1Cryptography / Transport Layer Security / Secure communication / E-commerce / Cryptographic protocols / Internet security / HTTPS / POODLE / Cipher suite / RC4 / Public key certificate / Certificate authority

Poster: Browser’s ”search form” issues and countermeasures Yuji Suga Internet Initiative Japan Inc., Iidabashi Grand Bloom, Fujimi, Chiyoda-ku, , Japan Abstract—From 2014, we are con

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 11:54:40
2Computing / Computer architecture / Android / System software / Online marketplaces / Google Play / Intent

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-05 07:38:02
3

CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees Thomas Bauereiß∗ , Armando Pesenti Gritti† , Andrei Popescu‡§ , Franco Raimondi‡ ∗ German Research Center for A

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:37
    4Xplore / Academic publishing / Institute of Electrical and Electronics Engineers / Academic conferences

    Guidelines for Special Session Proposers We want to make IEEE I2MTC 2019 an attractive venue, particularly for special sessions, to disseminate state-of-the-art knowledge on a niche topic related to the theme of the conf

    Add to Reading List

    Source URL: imtc.ieee-ims.org

    Language: English - Date: 2018-09-07 09:45:42
    5Computing / Internet / Statistical classification / Free software / Dark web / Secure communication / Tor / Relay / K-nearest neighbors algorithm / Outline of machine learning / Bandwidth / .tor

    Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-15 19:28:54
    6Dark web / Computing / Internet / Secure communication / Cryptographic protocols / Information and communications technology / Fingerprinting algorithms / Tor / .onion / Internet privacy / Operation Onymous / Computer network

    Poster: Fingerprinting Hidden Service Circuits from a Tor Middle Relay Marc Juarez Rob Jansen

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-06-21 13:36:21
    7Identification / Computing / Cryptography / Security engineering / Touchscreens / Multi-touch / Biometrics / Gesture / Authentication / Support vector machine / Shoulder surfing / Tablet computer

    Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:58:59
    8

    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 35, NO. 9, SEPTEMBERAutonomous Relay for Millimeter-Wave Wireless Communications

    Add to Reading List

    Source URL: wirelesslab.sjtu.edu.cn

    Language: English - Date: 2017-12-01 00:35:36
      9Computing / Software engineering / Computer programming / Object-oriented programming languages / Programming languages / Static program analysis / Software testing / Control flow / Static single assignment form / Call graph / Program analysis / Recursion

      2015 IEEE Symposium on Security and Privacy Effective Real-time Android Application Auditing Mingyuan Xia McGill University

      Add to Reading List

      Source URL: mxia.me

      Language: English - Date: 2017-02-08 07:01:32
      10

      Finding and Preventing Bugs in JavaScript Bindings Fraser Brown⋆ Dawson Engler⋆ ⋆ Shravan Narayan†

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 15:58:08
        UPDATE