Leakage-resilient cryptosystems aim to maintain security in situations where their implementation leaks physical information about their internal secrets. Because of their efficie...
Given the increasing adoption of Bitcoin, the number of transactions and the block sizes within the system are only expected to increase. To sustain its correct operation in spite...
Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame...
An Android app’s graphical user interface (GUI) displays rich semantic and contextual information about the smartphone’s owner and app’s execution. Such information provides...
New regulations mandating firms to share information on security breaches and security practices with authorities are high on the policy agenda around the globe. These initiative...
Off-path packet injection attacks are still serious threats to the Internet and network security. In recent years, a number of studies have discovered new variations of packet inj...
Qi Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru...