Papers

Search results

    ConferenceTitleAuthor(s)
    FOCI '18Exploring User Mental Models of End-to-End Encrypted Communication ToolsRuba Abu-Salma, Elissa M. Redmiles, Blase Ur, Miranda Wei
    FOCI '18A Bestiary of Blocking: The Motivations and Modes behind Website UnavailabilityMichael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson
    FOCI '18HSTS Supports Targeted SurveillancePaul Syverson, Matthew Traudt
    FOCI '18A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and SeizureCharles V. Wright, Mayank Varia
    FOCI '17Measuring Decentralization of Chinese Keyword Censorship via Mobile Games Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
    FOCI '17The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup Rima Tanash, Zhouhan Chen, Dan Wallach, Melissa Marschall
    FOCI '17Autosonda: Discovering Rules and Triggers of Censorship Devices Jill Jermyn, Nicholas Weaver
    FOCI '17Ambivalence in the (Private) Public Sphere: How Global Digital Activists Navigate Risk Sarah Myers West
    FOCI '17Creative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Franziska Roesner, Kelly Caine, Susan McGregor
    FOCI '17Measuring Offensive Speech in Online Political DiscourseRishab Nithyanand, Brian Schaffner, Phillipa Gill
    FOCI '17SecurePost: Verified Group-Anonymity on Social Media Michael Nekrasov, Daniel Iland, Miriam Metzger, Ben Zhao, Elizabeth Belding
    FOCI '17An ISP-Scale Deployment of TapDance Sergey Frolov, Fred Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, Alex Halderman, Eric Wustrow
    FOCI '17Alice and Bob, who the FOCI are they?: Analysis of end-to-end encryption in the LINE messaging applicationAntonio M. Espinoza, William J. Tolley, Jedidiah R. Crandall, Masashi Crete-Nishihata, Andrew Hilts
    FOCI '17Best We Forget: Expressive Freedom and the Right to be ForgottenMaryna Polataiko
    FOCI '16The Politics of Routing: Investigating the Relationship between AS Connectivity and Internet FreedomRachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, Leman Akoglu
    FOCI '16DNS-sly: Avoiding Censorship through Network ComplexityQurat-Ul-Ann Danyal Akbar, Marcel Flores, Aleksandar Kuzmanovic
    FOCI '16Censors’ Delay in Blocking Circumvention ProxiesDavid Fifield, Lynn Tsai
    FOCI '16GhostPost: Seamless Restoration of Censored Social Media PostsFrederick Douglas, Matthew Caesar
    FOCI '16Adblocking and Counter Blocking: A Slice of the Arms RaceRishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, Steven J. Murdoch
    FOCI '16Privacy and Security Issues in BAT Web BrowsersJeffrey Knockel, Adam Senft, Ronald Deibert
    FOCI '16Matryoshka: Hiding Secret Communication in Plain SightIris Safaka, Christina Fragouli, Katerina Argyraki
    FOCI '15An Analysis of China’s “Great Cannon”Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, Vern Paxson
    FOCI '15Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in ChinaJeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall
    FOCI '15Understanding Internet Censorship Policy: The Case of GreeceVasilis Ververis, George Kargiotakis, Arturo Filastò, Benjamin Fabian, Afentoulis Alexandros
    FOCI '15Half Baked: The Opportunity to Secure Cookie-based Identifiers from Passive SurveillanceAndrew Hilts, Christopher Parsons

Pages