Vijay k. Gurbani and Cynthia Hood ( Illinois Institute of Technology), Anita Nikolich (University of Illinois), Henning Schulzrinne (Columbia University) and Radu State (University of Luxembourg)
When DNS Goes Dark: Understanding Privacy and Shaping Policy of an Evolving Protocol
View More Papers
Trusted Verification of Over-the-Air (OTA) Secure Software Updates on...
Anway Mukherjee, Ryan Gerdes, and Tam Chantem (Virginia Tech)
Read MorePhantomCache: Obfuscating Cache Conflicts with Localized Randomization
Qinhan Tan (Zhejiang University), Zhihua Zeng (Zhejiang University), Kai Bu (Zhejiang University), Kui Ren (Zhejiang University)
Read MoreObfuscated Access and Search Patterns in Searchable Encryption
Zhiwei Shang (University of Waterloo), Simon Oya (University of Waterloo), Andreas Peter (University of Twente), Florian Kerschbaum (University of Waterloo)
Read MoreVision-Based Two-Factor Authentication & Localization Scheme for Autonomous Vehicles
Anas Alsoliman, Marco Levorato, and Qi Alfred Chen (UC Irvine)
Read More