Filter
Published conference contribution

Search results

  • 2023

    A Broadband Subliminal Channel in Signatures Without Sharing the Signing Key

    Hu, Q., Xu, C. & Li, W., 1 Nov 2023, 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Hu, J., Min, G., Wang, G. & Georgalas, N. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 822-830 9 p. (International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    Open Access
    File
  • 2020

    Evolutionary Algorithms in Web Security: Exploring Untapped Potential

    Attwood, S., Li, W. & Kharel, R., 10 Nov 2020, 12th International Symposium on Communication Systems, Networks and Digital Signal Processing. IEEE Explore, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    2 Citations (Scopus)
  • User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., Sept 2020, Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. Institute of Electrical and Electronics Engineers Inc., p. 664-672 9 p. 9229747

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    13 Citations (Scopus)
  • 2019

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. & Chen, T., Nov 2019, Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop. ACM, p. 35-44

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    Open Access
    File
    22 Citations (Scopus)
    190 Downloads (Pure)
  • 2018

    Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data

    Zhou, R., Zhang, X., Wang, X., Yang, G. & Li, W., 7 Dec 2018, Algorithms and Architectures for Parallel Processing: ICA3PP. Springer , p. 288-302 (Lecture Notes in Computer Science; vol. 11337).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    6 Citations (Scopus)
  • Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Li, W., Mitchell, C. J. & Chen, T., 24 Nov 2018, Security Protocols XXVI : Security Protocols 2018. Matyáš, V., Švenda, P., Stajano, F. & Christianson, B. (eds.). Springer , p. 24-41 (Lecture Notes in Computer Science; vol. 11286).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    5 Citations (Scopus)
  • Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking

    Al-Fannah, N. M., Li, W. & J. Mitchell, C., 2018, Information Security: ISC 2018. Springer , p. 481-501 (Lecture Notes in Computer Science; vol. 11060).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    8 Citations (Scopus)
  • Mitigating CSRF attacks on OAuth 2.0 Systems

    Li, W., Mitchell, C. J. & Chen, T., 2018, 16th Annual Conference on Privacy, Security and Trust (PST). IEEE Explore, p. 1-5

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    7 Citations (Scopus)
  • 2017

    Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability

    Al-Fannah, N. M. & Li, W., 27 Jul 2017, Advances in Information and Computer Security : IWSEC 2017. Obana, S. & Chida, K. (eds.). Springer , p. 105-120 (Lecture Notes in Computer Science; vol. 10418).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    10 Citations (Scopus)
  • 2016

    Analysing the Security of Google’s Implementation of OpenID Connect

    Li, W. (Corresponding Author) & Mitchell, C., 12 Jun 2016, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment: DIMVA 2016. Callabero, J., Zurutuza , U. & Rodríguez , R. (eds.). Cham: Springer , p. 357-376 19 p. (Lecture Notes in Computer Science; vol. 9721).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    Open Access
    File
    34 Citations (Scopus)
    18 Downloads (Pure)
  • 2015

    Addressing Threats to Real-World Identity Management Systems

    Li, W. & Mitchell, C. J., 6 Oct 2015, Information Security Solutions Europe: ISSE 2015. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Springer , p. 251-259

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

  • Generating Unlinkable IPv6 Addresses

    Kayuni, M. N., Khan, M. S. A., Li, W., Mitchell, C. J. & Yau, P.-W., 2015, Security Standardisation Research. SSR 2015. Chen, L. & Matsuo, S. (eds.). Springer , p. 185-199 17 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

  • 2014

    Security Issues in OAuth 2.0 SSO Implementations

    Li, W. & Mitchell, C., 14 Oct 2014, International Conference on Information Security. Chow, S., Camenisch , J., Hui , L. & Yui, S. (eds.). Cham: Springer , p. 529-541 13 p. (Lecture Notes in Computer Science; vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    Open Access
    File
    42 Citations (Scopus)
    128 Downloads (Pure)