Charles V. Wright
According to our database1,
Charles V. Wright
authored at least 22 papers
between 2004 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Proc. Priv. Enhancing Technol., 2021
2019
IACR Cryptol. ePrint Arch., 2019
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and Seizure.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
IACR Cryptol. ePrint Arch., 2017
The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage.
IACR Cryptol. ePrint Arch., 2017
2016
The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2010
ACM Trans. Inf. Syst. Secur., 2010
Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
2009
Proceedings of the Network and Distributed System Security Symposium, 2009
2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
2007
Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
Proceedings of the Network and Distributed System Security Symposium, 2007
2006
J. Mach. Learn. Res., 2006
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006
2004
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004