What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS ES Alashwali, K Rasmussen Security and Privacy in Communication Networks (SecureComm), 2018 | 36* | 2018 |
Cryptographic vulnerabilities in real-life web servers ES Alashwali 2013 Third International Conference on Communications and Information …, 2013 | 16 | 2013 |
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective ES Alashwali, P Szalachowski, A Martin Computers & Security 97 (101975), 2020 | 12 | 2020 |
Does "www." Mean Better Transport Layer Security? ES Alashwali, P Szalachowski, A Martin The 14th International Conference on Availability, Reliability and Security …, 2019 | 9 | 2019 |
Towards Forward Secure Internet Traffic ES Alashwali, P Szalachowski, A Martin The 15th International Conference in Security and Privacy in Communication …, 2019 | 4 | 2019 |
Incorporating hacking projects in computer and information security education: an empirical study E Alashwali International Journal of Electronic Security and Digital Forensics 6 (3 …, 2014 | 3 | 2014 |
Saudi parents’ privacy concerns about their children’s smart device applications E Alashwali, F Alashwali International Journal of Child-Computer Interaction 33 (100486), 2022 | 2 | 2022 |
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name ES Alashwali, K Rasmussen The 14th International Conference on Security and Privacy in Communication …, 2018 | 2 | 2018 |
DSTC: DNS-based Strict TLS Configurations ES Alashwali, P Szalachowski The 13th International Conference on Risks and Security of Internet and Systems, 2018 | 1 | 2018 |
Design and evaluation of competition-based hacking exercises E Alashwali, H Ben-Abdallah 2015 IEEE Global Engineering Education Conference (EDUCON), 998-1007, 2015 | 1 | 2015 |
Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia E Alashwali, LF Cranor https://arxiv.org/pdf/2308.10148.pdf, 2023 | | 2023 |
" Negotiation-transparency" as a property in configurable protocols: transfer of status report 2017 E Alashwali University of Oxford, 2020 | | 2020 |
Negotiation transparency and consistency in configurable protocols: an empirical investigation ES Alashwali University of Oxford, 2020 | | 2020 |
Secure Verifiable Remote Attestation of Embedded Devices E Alashwali CDT Technical Paper 3, 2017 | | 2017 |
CDT mini-project-2 research proposal: on downgrade attacks in TLS protocol E Alashwali University of Oxford, 2016 | | 2016 |
CDT Technical Paper E Alashwali | | 2016 |
Software Security Assessment smbftpd-0.96 E Alashwali | | 2012 |