Automated certificate authorities (CAs) have expanded the reach of publi...
Software repositories, used for wide-scale open software distribution, a...
While attackers often distribute malware to victims via open-source,
com...
We present ShorTor, a protocol for reducing latency on the Tor network.
...