Certified lies: Detecting and defeating government interception attacks against SSL C Soghoian, S Stamm Financial Cryptography and Data Security, 2011 | 337* | 2011 |
Caught in the cloud: Privacy, encryption, and government back doors in the web 2.0 era C Soghoian Journal on Telecommunications and High Technology Law, 2010 | 180 | 2010 |
Anti-phishing system and method C Soghoian, K Caine US Patent 8,220,047, 2012 | 144 | 2012 |
Can You See Me Now: Toward Reasonable Standards for Law Enforcement Access to Location Data that Congress Could Enact S Pell, C Soghoian Berkeley Technology Law Journal 27, 2012 | 111 | 2012 |
Your secret stingray's no secret anymore: The vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy SK Pell, C Soghoian Harv. JL & Tech. 28, 1, 2014 | 110 | 2014 |
A lot more than a pen register, and less than a wiretap: what the StingRay teaches us about how Congress should approach the reform of law enforcement surveillance authorities SK Pell, C Soghoian Yale JL & Tech. 16, 134, 2013 | 89 | 2013 |
Method and apparatus for performing delegated transactions C Soghoian, I Aad US Patent App. 12/220,744, 2009 | 67 | 2009 |
An end to privacy theater: Exposing and discouraging corporate disclosure of user data to the government C Soghoian Minnesota Journal of Law, Science & Technology, 2010 | 45 | 2010 |
Enforced community standards for research on users of the Tor anonymity network C Soghoian Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR …, 2012 | 32 | 2012 |
The Problem of Anonymous Vanity Searches C Soghoian I/S: A Journal of Law and Policy for the Information Society 3 (2), 299, 2007 | 30 | 2007 |
Mantis: A lightweight, server-anonymity preserving, searchable P2P network SC Bono, C Soghoian, F Monrose Information Security Institute Johns Hopkins University, Tech. Rep. TR-2004 …, 2004 | 23 | 2004 |
Anti-phishing system and method C Soghoian, K Caine US Patent 8,713,677, 2014 | 22 | 2014 |
Why private browsing modes do not deliver real privacy C Soghoian Center for Applied Cyber security Research, Bloomington, 2011 | 21 | 2011 |
Legal risks for phishing researchers C Soghoian 2008 eCrime Researchers Summit, 1-11, 2008 | 21 | 2008 |
The history of the do not track header C Soghoian Slight Paranoia, February, 2012 | 20 | 2012 |
How dropbox sacrifices user privacy for cost savings C Soghoian Post to Slight Paranoia blog, 2011 | 20 | 2011 |
Merx: Secure and privacy preserving delegated payments C Soghoian, I Aad International Conference on Trusted Computing, 217-239, 2009 | 17 | 2009 |
Caveat venditor: Technologically protected subsidized goods and the customers who hack them C Soghoian Nw. J. Tech. & Intell. Prop. 6, 46, 2007 | 17 | 2007 |
The spies we trust: Third party service providers and law enforcement surveillance C Soghoian Indiana University, 2012 | 14 | 2012 |
A deceit-augmented man in the middle attack against Bank of America’s SiteKey service C Soghoian, M Jakobsson Post to Slight Paranoia blog, 2007 | 13 | 2007 |