Cited By
View all- Kaspereit JÖndarö GCesar GEbbers SIsing FSaatjohann CJonker MHolz RSchinzel SBalzarotti DXu W(2024)LanDscAPeProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698969(1225-1242)Online publication date: 14-Aug-2024
- Knockel JWang MReichert ZLuo BLiao XXu JKirda ELie D(2024)The Not-So-Silent Type: Vulnerabilities in Chinese IME Keyboards' Network Security ProtocolsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690302(1701-1715)Online publication date: 2-Dec-2024
- Luo MFeng BLu LKirda ERen K(2024)On the Complexity of the Web’s PKI: Evaluating Certificate Validation of Mobile BrowsersIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.325586921:1(419-433)Online publication date: Jan-2024
- Show More Cited By