J. Solano, L. Tengana, A. Castelblanco, E. Rivera, C. Lopez, M. Ochoa

View More Papers

The impact of data-heavy, post-quantum TLS 1.3 on the...

Panos Kampanakis and Will Childs-Klein (AWS)

Read More

insecure:// Vulnerability Analysis of URI Scheme Handling in Android...

Abdulla Aldoseri (University of Birmingham) and David Oswald (University of Birmingham)

Read More

Why do Internet Devices Remain Vulnerable? A Survey with...

Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)

Read More

Shepherd: A Generic Approach to Automating Website Login

H. Jonker, S. Karsch, B. Krumnow, M. Sleegers

Read More