AbdelRahman Abdou

Orcid: 0000-0002-2783-107X

According to our database1, AbdelRahman Abdou authored at least 22 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Work in progress: Identifying Two-Factor Authentication Support in Banking Sites.
CoRR, 2022

Position Paper: Certificate Root Stores - An Area of Unity or Disparity?
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

2021
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes.
IEEE Trans. Dependable Secur. Comput., 2021

Certificate Root Stores: An Area of Unity or Disparity?
CoRR, 2021

2020
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols.
IACR Cryptol. ePrint Arch., 2020

SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband.
IACR Cryptol. ePrint Arch., 2019

Proxy Certificates: The Missing Link in the Web's Chain of Trust.
CoRR, 2019

2018
Secure Client and Server Geolocation over the Internet.
login Usenix Mag., 2018

Server Location Verification (SLV) and Server Location Pinning: Augmenting TLS Authentication.
ACM Trans. Priv. Secur., 2018

Internet Location Verification: Challenges and Solutions.
CoRR, 2018

Comparative Analysis of Control Plane Security of SDN and Conventional Networks.
IEEE Commun. Surv. Tutorials, 2018

2017
Location Verification of Wireless Internet Clients: Evaluation and Improvements.
IEEE Trans. Emerg. Top. Comput., 2017

CPV: Delay-Based Location Verification for the Internet.
IEEE Trans. Dependable Secur. Comput., 2017

A survey on forensic event reconstruction systems.
Int. J. Inf. Comput. Secur., 2017

A Framework and Comparative Analysis of Control Plane Security of SDN and Conventional Networks.
CoRR, 2017

Accurate Manipulation of Delay-based Internet Geolocation.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Server Location Verification and Server Location Pinning: Augmenting TLS Authentication.
CoRR, 2016

2015
Accurate One-Way Delay Estimation With Reduced Client Trustworthiness.
IEEE Commun. Lett., 2015

Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying.
IEEE Commun. Lett., 2015

What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks.
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

2014
Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients.
Proceedings of the IEEE Conference on Communications and Network Security, 2014


  Loading...