On interdomain routing security and pretty secure BGP (psBGP) PC Oorschot, T Wan, E Kranakis ACM Transactions on Information and System Security (TISSEC) 10 (3), 11-es, 2007 | 192 | 2007 |
Pretty Secure BGP, psBGP. T Wan, E Kranakis, PC van Oorschot NDSS, 2005 | 185 | 2005 |
When HTTPS meets CDN: A case of authentication in delegated service J Liang, J Jiang, H Duan, K Li, T Wan, J Wu 2014 IEEE Symposium on Security and Privacy, 67-82, 2014 | 166 | 2014 |
Comparative analysis of control plane security of SDN and conventional networks AR Abdou, PC Van Oorschot, T Wan IEEE Communications Surveys & Tutorials 20 (4), 3542-3559, 2018 | 120 | 2018 |
Resisting malicious packet dropping in wireless ad hoc networks M Just, E Kranakis, T Wan Ad-Hoc, Mobile, and Wireless Networks: Second International Conference …, 2003 | 114 | 2003 |
A performance study of CPRI over ethernet T Wan, P Ashwood IEEE, 2015 | 112* | 2015 |
Falcon: A fourier transform based approach for fast and secure convolutional neural network predictions S Li, K Xue, B Zhu, C Ding, X Gao, D Wei, T Wan Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020 | 93 | 2020 |
Cookies Lack Integrity:{Real-World} Implications X Zheng, J Jiang, J Liang, H Duan, S Chen, T Wan, N Weaver 24th USENIX Security Symposium (USENIX Security 15), 707-721, 2015 | 68 | 2015 |
TwoStep: An authentication method combining text and graphical passwords PC Van Oorschot, T Wan E-Technologies: Innovation in an Open World: 4th International Conference …, 2009 | 63 | 2009 |
Analysis of BGP prefix origins during Google's May 2005 outage T Wan, PC Van Oorschot Proceedings 20th IEEE International Parallel & Distributed Processing …, 2006 | 63 | 2006 |
S-rip: A secure distance vector routing protocol T Wan, E Kranakis, PC van Oorschot Applied Cryptography and Network Security: Second International Conference …, 2004 | 60 | 2004 |
Forwarding-Loop Attacks in Content Delivery Networks. J Chen, X Zheng, HX Duan, J Liang, J Jiang, K Li, T Wan, V Paxson NDSS, 2016 | 46 | 2016 |
Securing the destination-sequenced distance vector routing protocol (S-DSDV) T Wan, E Kranakis, PC Van Oorschot Information and Communications Security: 6th International Conference, ICICS …, 2004 | 42 | 2004 |
Host of troubles: Multiple host ambiguities in http implementations J Chen, J Jiang, H Duan, N Weaver, T Wan, V Paxson Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 41 | 2016 |
We still {Don’t} have secure {Cross-Domain} requests: An empirical study of {CORS} J Chen, J Jiang, H Duan, T Wan, S Chen, V Paxson, M Yang 27th USENIX Security Symposium (USENIX Security 18), 1079-1093, 2018 | 37 | 2018 |
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ... 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10, 2018 | 32 | 2018 |
Measuring the deployment of 5g security enhancement S Nie, Y Zhang, T Wan, H Duan, S Li Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022 | 23 | 2022 |
IntruDetector: a software platform for testing network intrusion detection algorithms T Wan, XD Yang Seventeenth Annual Computer Security Applications Conference, 3-11, 2001 | 23 | 2001 |
A selective introduction to border gateway protocol (BGP) security issues T Wan, PC van Oorschot, E Kranakis Aspects of Network and Information Security, 152-175, 2008 | 18 | 2008 |
A framework and comparative analysis of control plane security of SDN and conventional networks AR Abdou, PC Van Oorschot, T Wan arXiv preprint arXiv:1703.06992, 2017 | 17 | 2017 |