Mallory Knodel (Center for Democracy and Technology), Shivan Sahib (Salesforce)
DNS Privacy Vs : Confronting protocol design trade offs in the public interest
View More Papers
Shadow Attacks: Hiding and Replacing Content in Signed PDFs
Christian Mainka (Ruhr University Bochum), Vladislav Mladenov (Ruhr University Bochum), Simon Rohlmann (Ruhr University Bochum)
Read MoreDemo #3: Detecting Illicit Drone Video Filming Using Cryptanalysis
Ben Nassi, Raz Ben-Netanel (Ben-Gurion University of the Negev), Adi Shamir (Weizmann Institute of Science), and Yuval Elovic (Ben-Gurion University of the Negev)
Read MoreVision-Based Two-Factor Authentication & Localization Scheme for Autonomous Vehicles
Anas Alsoliman, Marco Levorato, and Qi Alfred Chen (UC Irvine)
Read MoreForward and Backward Private Conjunctive Searchable Symmetric Encryption
Sikhar Patranabis (ETH Zurich), Debdeep Mukhopadhyay (IIT Kharagpur)
Read More