Follow
Charles V. Wright
Charles V. Wright
Associate Professor, Portland State University
Verified email at pdx.edu - Homepage
Title
Cited by
Cited by
Year
Inference attacks on property-preserving encrypted databases
M Naveed, S Kamara, CV Wright
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
6822015
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
CV Wright, SE Coull, F Monrose
NDSS 9, 2009
4552009
On inferring application protocol behaviors in encrypted network traffic
CV Wright, F Monrose, GM Masson
Journal of Machine Learning Research 7 (Dec), 2745-2769, 2006
3312006
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
Security and Privacy, 2008. SP 2008. IEEE Symposium on, 35-49, 2008
3242008
Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?
CV Wright, L Ballard, F Monrose, GM Masson
USENIX Security Symposium 3, 43-54, 2007
2732007
HMM profiles for network traffic classification
C Wright, F Monrose, GM Masson
Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004
1762004
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter
NDSS 7, 35-47, 2007
1652007
The shadow nemesis: Inference attacks on efficiently deployable, efficiently searchable encryption
D Pouliot, CV Wright
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1432016
On Web Browsing Privacy in Anonymized NetFlows.
SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter
USENIX Security Symposium, 339-352, 2007
1122007
Thumbnail-preserving encryption for JPEG
CV Wright, W Feng, F Liu
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia …, 2015
822015
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
K Tajik, A Gunasekaran, R Dutta, B Ellis, RB Bobba, M Rosulek, ...
80*
Uncovering spoken phrases in encrypted voice over IP conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
ACM Transactions on Information and System Security (TISSEC) 13 (4), 35, 2010
712010
Taming the Devil: Techniques for Evaluating Anonymized Network Data.
SE Coull, CV Wright, AD Keromytis, F Monrose, MK Reiter
NDSS, 2008
692008
Approximate Thumbnail Preserving Encryption
B Marohn, CV Wright, W Feng, M Rosulek, RB Bobba
Proceedings of the 2017 on Multimedia Privacy and Security, 33-43, 2017
652017
Generating client workloads and high-fidelity network traffic for controllable, repeatable experiments in computer security
CV Wright, C Connelly, T Braje, JC Rabek, LM Rossey, RK Cunningham
International Workshop on Recent Advances in Intrusion Detection, 218-237, 2010
462010
Using visual motifs to classify encrypted traffic
CV Wright, F Monrose, GM Masson
Proceedings of the 3rd international workshop on Visualization for computer …, 2006
462006
Crypto Crumple Zones: Enabling limited Access without Mass Surveillance
C Wright, M Varia
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 288-306, 2018
342018
Towards better protocol identification using profile HMMs
CV Wright, F Monrose, GM Masson
JHU Tech. Rep. JHU-SPAR051201, 2005
142005
Early Detection and Analysis of Leakage Abuse Vulnerabilities
CV Wright, D Pouliot
132017
A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and Seizure
CV Wright, M Varia
8th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20