Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Mashael AlSabah"'
Publikováno v:
IEEE Access, Vol 9, Pp 28769-28784 (2021)
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk with the advances in surveil
Externí odkaz:
https://doaj.org/article/d1394529da3a46ed995a747fa72df769
Publikováno v:
ACM Transactions on Privacy and Security. 26:1-32
We propose to identify compromised mobile devices from a network administrator’s point of view. Intuitively, inadvertent users (and thus their devices) who download apps through untrustworthy markets are often lured to install malicious apps throug
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Publikováno v:
25th International Symposium on Research in Attacks, Intrusions and Defenses.
Publikováno v:
Pervasive and Mobile Computing. 41:28-45
Application development and deployment on Mobile Ad Hoc Networks (MANET) is a major challenge in the widespread use of MANET. The increasing D2D communication in 5G networks has renewed interest in an effective middleware design for MANET where appli
Publikováno v:
Computers & Security. 70:1-15
We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment problems of previous IBC
Publikováno v:
IWCMC
Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of routers (called onion router
This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless networks. The evil twin is a rogue Wifi Access Point (AP) that pretends to be an authentic one by using the same network configuration, including the (
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3db7d1107d55cb4927b913a574fd5c60
https://hdl.handle.net/10576/27566
https://hdl.handle.net/10576/27566
Autor:
Mashael AlSabah, Ian Goldberg
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more than three dozen proposals th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b12084482391eb53df7c2523cf9db576
https://hdl.handle.net/10576/21144
https://hdl.handle.net/10576/21144
Publikováno v:
Qatar Foundation Annual Research Conference Proceedings Volume 2016 Issue 1.
In this new century, the growth of Information and Communication Technology (ICT) has a significant influence on our life. The wide spread of internet created an information society where the creation, distribution, use, integration and manipulation