Christopher A. Wood

Orcid: 0000-0003-3297-4216

Affiliations:
  • Apple, USA
  • University of California, Irvine, Department of Computer Science (former)


According to our database1, Christopher A. Wood authored at least 67 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Partitioning as an Architecture for Privacy.
RFC, July, 2024

The Flexible Round-Optimized Schnorr Threshold (FROST) Protocol for Two-Round Schnorr Signatures.
RFC, June, 2024

Privacy Pass Issuance Protocols.
RFC, June, 2024

The Privacy Pass HTTP Authentication Scheme.
RFC, June, 2024

The Privacy Pass Architecture.
RFC, June, 2024

Oblivious HTTP.
RFC, January, 2024

2023
Oblivious Pseudorandom Functions (OPRFs) Using Prime-Order Groups.
RFC, December, 2023

Discovery of Designated Resolvers.
RFC, November, 2023

RSA Blind Signatures.
RFC, October, 2023

Evaluating practical QUIC website fingerprinting defenses for the masses.
Proc. Priv. Enhancing Technol., October, 2023

SPAKE2+, an Augmented Password-Authenticated Key Exchange (PAKE) Protocol.
RFC, September, 2023

Hashing to Elliptic Curves.
RFC, August, 2023

Hot Topics in Security and Privacy Standardization at the IETF and Beyond.
IEEE Secur. Priv., 2023

Post-Quantum Privacy Pass via Post-Quantum Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2023

Security Analysis of Signature Schemes with Key Blinding.
IACR Cryptol. ePrint Arch., 2023

Not-So-Low Hanging Fruit: Security and Privacy Research Opportunities for IETF Protocols.
Proceedings of the Applied Networking Research Workshop, 2023

2022
Binary Representation of HTTP Messages.
RFC, August, 2022

Importing External Pre-Shared Keys (PSKs) for TLS 1.3.
RFC, July, 2022

Guidance for External Pre-Shared Key (PSK) Usage in TLS.
RFC, July, 2022

Oblivious DNS over HTTPS.
RFC, June, 2022

TLS Ticket Requests.
RFC, April, 2022

Hybrid Public Key Encryption.
RFC, February, 2022

This is not the padding you are looking for! On the ineffectiveness of QUIC PADDING against website fingerprinting.
CoRR, 2022

Might I Get Pwned: A Second Generation Compromised Credential Checking Service.
Proceedings of the 31st USENIX Security Symposium, 2022

Respect the ORIGIN!: a best-case evaluation of connection coalescing in the wild.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS.
Proc. Priv. Enhancing Technol., 2021

A Fast and Simple Partially Oblivious PRF, with Applications.
IACR Cryptol. ePrint Arch., 2021

Implementing and Measuring KEMTLS.
IACR Cryptol. ePrint Arch., 2021

The ties that un-bind: decoupling IP from web services and sockets for robust addressing agility at CDN-scale.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

2020
Randomness Improvements for Security Protocols.
RFC, October, 2020

A Survey of the Interaction between Security Protocols and Transport Services.
RFC, October, 2020

Information-Centric Networking (ICN): Content-Centric Networking (CCNx) and Named Data Networking (NDN) Terminology.
RFC, June, 2020

Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS.
CoRR, 2020

2019
Content-Centric Networking (CCNx) Messages in TLV Format.
RFC, July, 2019

Content-Centric Networking (CCNx) Semantics.
RFC, July, 2019

Privacy-Aware Caching in Information-Centric Networking.
IEEE Trans. Dependable Secur. Comput., 2019

2017
Security and Privacy Challenges in Content-Centric Networks.
PhD thesis, 2017

Content-Centric Networking - Architectural Overview and Protocol Description.
CoRR, 2017

Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy.
Comput. Commun. Rev., 2017

Protecting the long tail: Transparent packet security in content-centric networks.
Proceedings of the 2017 IFIP Networking Conference, 2017

Mobile sessions in content-centric networks.
Proceedings of the 2017 IFIP Networking Conference, 2017

Namespace Tunnels in Content-Centric Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Mitigating On-Path Adversaries in Content-Centric Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Closing the Floodgate with Stateless Content-Centric Networking.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Secure off-path replication in content-centric networks.
Proceedings of the IEEE International Conference on Communications, 2017

When encryption is not enough: privacy attacks in content-centric networking.
Proceedings of the 4th ACM Conference on Information-Centric Networking, 2017

2016
(The Futility of) Data Privacy in Content-Centric Networking.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Practical accounting in content-centric networking.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

BEAD: Best effort autonomous deletion in content-centric networking.
Proceedings of the 2016 IFIP Networking Conference, 2016

Trust in Information-Centric Networking: From Theory to Practice.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

AC3N: Anonymous communication in Content-Centric Networking.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Network Names in Content-Centric Networking.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

2015
Practical Accounting in Content-Centric Networking (extended version).
CoRR, 2015

Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking.
CoRR, 2015

Interest-Based Access Control for Content Centric Networks (extended version).
CoRR, 2015

A complete L(2, 1) span characterization for small trees.
AKCE Int. J. Graphs Comb., 2015

An encryption-based access control framework for content-centric networking.
Proceedings of the 14th IFIP Networking Conference, 2015

Secure Fragmentation for Content-Centric Networks.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015

Constructing large S-boxes with area minimized implementations.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Secure Fragmentation for Content Centric Networking.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

A Network-Agnostic Data Framework and API for CCN.
Proceedings of the 2nd International Conference on Information-Centric Networking, 2015

Secure Name Configuration and Prefix Registration.
Proceedings of the 2nd International Conference on Information-Centric Networking, 2015

Interest-Based Access Control for Content Centric Networks.
Proceedings of the 2nd International Conference on Information-Centric Networking, 2015

2014
Cybersecurity Education: Bridging the Gap Between Hardware and Software Domains.
ACM Trans. Comput. Educ., 2014

Mission control: A performance metric and analysis of control logic for pipelined architectures on FPGAs.
Proceedings of the 2014 International Conference on ReConFigurable Computing and FPGAs, 2014

2013
High level synthesis: Where are we? A case study on matrix multiplication.
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2013


  Loading...