What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS ES Alashwali, K Rasmussen Security and Privacy in Communication Networks (SecureComm), 2018 | 40* | 2018 |
Cryptographic vulnerabilities in real-life web servers ES Alashwali 2013 Third International Conference on Communications and Information …, 2013 | 16 | 2013 |
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective ES Alashwali, P Szalachowski, A Martin Computers & Security 97 (101975), 2020 | 13 | 2020 |
Does "www." Mean Better Transport Layer Security? ES Alashwali, P Szalachowski, A Martin The 14th International Conference on Availability, Reliability and Security …, 2019 | 9 | 2019 |
Towards Forward Secure Internet Traffic ES Alashwali, P Szalachowski, A Martin The 15th International Conference in Security and Privacy in Communication …, 2019 | 4 | 2019 |
Incorporating hacking projects in computer and information security education: an empirical study E Alashwali International Journal of Electronic Security and Digital Forensics 6 (3 …, 2014 | 4 | 2014 |
Saudi parents’ privacy concerns about their children’s smart device applications E Alashwali, F Alashwali International Journal of Child-Computer Interaction 33 (100486), 2022 | 3 | 2022 |
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name ES Alashwali, K Rasmussen The 14th International Conference on Security and Privacy in Communication …, 2018 | 2 | 2018 |
Design and evaluation of competition-based hacking exercises E Alashwali, H Ben-Abdallah 2015 IEEE Global Engineering Education Conference (EDUCON), 998-1007, 2015 | 2 | 2015 |
DSTC: DNS-based Strict TLS Configurations ES Alashwali, P Szalachowski The 13th International Conference on Risks and Security of Internet and Systems, 2018 | 1 | 2018 |
Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia E Alashwali, LF Cranor International Conference on Human-Computer Interaction (HCII), 2024 | | 2024 |
Negotiation transparency and consistency in configurable protocols: an empirical investigation ES Alashwali University of Oxford, 2020 | | 2020 |
Secure Verifiable Remote Attestation of Embedded Devices E Alashwali University of Oxford. Centre for Doctoral Training in Cyber Security 3 (03/17), 2017 | | 2017 |
On downgrade attacks in the TLS protocol E Alashwali University of Oxford. Centre for Doctoral Training in Cyber Security 5 (05/16), 2016 | | 2016 |
Research proposal: on downgrade attacks in TLS protocol E Alashwali https://ora.ox.ac.uk/objects/uuid:0a826244-37b9-41c7-9df1-07bfd26b8c6e, 2016 | | 2016 |