AbdelRahman Abdou

Orcid: 0000-0002-2783-107X

According to our database1, AbdelRahman Abdou authored at least 26 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Fine-grained CDN Delegation.
CoRR, October, 2025

A Survey and Evaluation Framework for Secure DNS Resolution.
CoRR, September, 2025

Formal Security Analysis of ss2DNS.
Proceedings of the Computer Security - ESORICS 2025, 2025

2024
DNSSEC+: An Enhanced DNS Scheme Motivated by Benefits and Pitfalls of DNSSEC.
CoRR, 2024

2022
Work in progress: Identifying Two-Factor Authentication Support in Banking Sites.
CoRR, 2022

Position Paper: Certificate Root Stores - An Area of Unity or Disparity?
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

2021
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes.
IEEE Trans. Dependable Secur. Comput., 2021

Certificate Root Stores: An Area of Unity or Disparity?
CoRR, 2021

Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
Proxy Certificates: The Missing Link in the Web's Chain of Trust.
CoRR, 2019

UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Secure Client and Server Geolocation over the Internet.
login Usenix Mag., 2018

Server Location Verification (SLV) and Server Location Pinning: Augmenting TLS Authentication.
ACM Trans. Priv. Secur., 2018

Internet Location Verification: Challenges and Solutions.
CoRR, 2018

Comparative Analysis of Control Plane Security of SDN and Conventional Networks.
IEEE Commun. Surv. Tutorials, 2018

2017
Location Verification of Wireless Internet Clients: Evaluation and Improvements.
IEEE Trans. Emerg. Top. Comput., 2017

CPV: Delay-Based Location Verification for the Internet.
IEEE Trans. Dependable Secur. Comput., 2017

A survey on forensic event reconstruction systems.
Int. J. Inf. Comput. Secur., 2017

A Framework and Comparative Analysis of Control Plane Security of SDN and Conventional Networks.
CoRR, 2017

Accurate Manipulation of Delay-based Internet Geolocation.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Server Location Verification and Server Location Pinning: Augmenting TLS Authentication.
CoRR, 2016

2015
Accurate One-Way Delay Estimation With Reduced Client Trustworthiness.
IEEE Commun. Lett., 2015

Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying.
IEEE Commun. Lett., 2015

What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks.
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

2014
Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients.
Proceedings of the IEEE Conference on Communications and Network Security, 2014


  Loading...