Cited By
View all- Knockel JWang MReichert ZLuo BLiao XXu JKirda ELie D(2024)The Not-So-Silent Type: Vulnerabilities in Chinese IME Keyboards' Network Security ProtocolsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690302(1701-1715)Online publication date: 2-Dec-2024
- Luo MFeng BLu LKirda ERen K(2024)On the Complexity of the Web’s PKI: Evaluating Certificate Validation of Mobile BrowsersIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.325586921:1(419-433)Online publication date: Jan-2024
- Nash AStudiawan HGrispos GChoo K(2024)Security Analysis of Google Authenticator, Microsoft Authenticator, and AuthyDigital Forensics and Cyber Crime10.1007/978-3-031-56583-0_13(197-206)Online publication date: 3-Apr-2024
- Show More Cited By