Charles V. Wright

According to our database1, Charles V. Wright authored at least 22 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
On the (Im)Practicality of Adversarial Perturbation for Image Privacy.
Proc. Priv. Enhancing Technol., 2021

2019
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption.
IACR Cryptol. ePrint Arch., 2019

The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and Seizure.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Early Detection and Analysis of Leakage Abuse Vulnerabilities.
IACR Cryptol. ePrint Arch., 2017

The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage.
IACR Cryptol. ePrint Arch., 2017

Approximate Thumbnail Preserving Encryption.
IACR Cryptol. ePrint Arch., 2017

2016
The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Thumbnail-Preserving Encryption for JPEG.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

Inference Attacks on Property-Preserving Encrypted Databases.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2010
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations.
ACM Trans. Inf. Syst. Secur., 2010

Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2009

2008
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Taming the Devil: Techniques for Evaluating Anonymized Network Data.
Proceedings of the Network and Distributed System Security Symposium, 2008

2007
Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

On Web Browsing Privacy in Anonymized NetFlows.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
Proceedings of the Network and Distributed System Security Symposium, 2007

2006
On Inferring Application Protocol Behaviors in Encrypted Network Traffic.
J. Mach. Learn. Res., 2006

Using visual motifs to classify encrypted traffic.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

2004
HMM profiles for network traffic classification.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004


  Loading...