default search action
Christopher A. Wood
Person information
- affiliation: University of California, Irvine, Department of Computer Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i33]Martin Thomson, Christopher A. Wood:
Oblivious HTTP. RFC 9458: 1-40 (2024) - [i32]Alex Davidson, Jana Iyengar, Christopher A. Wood:
The Privacy Pass Architecture. RFC 9576: 1-25 (2024) - [i31]Tommy Pauly, Steven Valdez, Christopher A. Wood:
The Privacy Pass HTTP Authentication Scheme. RFC 9577: 1-25 (2024) - [i30]Sofía Celi, Alex Davidson, Steven Valdez, Christopher A. Wood:
Privacy Pass Issuance Protocols. RFC 9578: 1-36 (2024) - [i29]Deirdre Connolly, Chelsea Komlo, Ian Goldberg, Christopher A. Wood:
The Flexible Round-Optimized Schnorr Threshold (FROST) Protocol for Two-Round Schnorr Signatures. RFC 9591: 1-47 (2024) - [i28]Mirja Kühlewind, Tommy Pauly, Christopher A. Wood:
Partitioning as an Architecture for Privacy. RFC 9614: 1-23 (2024) - 2023
- [j7]Christopher A. Wood:
Hot Topics in Security and Privacy Standardization at the IETF and Beyond. IEEE Secur. Priv. 21(2): 57-62 (2023) - [j6]Sandra Siby, Ludovic Barman, Christopher A. Wood, Marwan Fayed, Nick Sullivan, Carmela Troncoso:
Evaluating practical QUIC website fingerprinting defenses for the masses. Proc. Priv. Enhancing Technol. 2023(4): 79-95 (2023) - [c29]Christopher A. Wood:
Not-So-Low Hanging Fruit: Security and Privacy Research Opportunities for IETF Protocols. ANRW 2023: 41-43 - [i27]Edward Eaton, Tancrède Lepoint, Christopher A. Wood:
Security Analysis of Signature Schemes with Key Blinding. IACR Cryptol. ePrint Arch. 2023: 380 (2023) - [i26]Guru-Vamsi Policharla, Bas Westerbaan, Armando Faz-Hernández, Christopher A. Wood:
Post-Quantum Privacy Pass via Post-Quantum Anonymous Credentials. IACR Cryptol. ePrint Arch. 2023: 414 (2023) - [i25]Armando Faz-Hernández, Sam Scott, Nick Sullivan, Riad S. Wahby, Christopher A. Wood:
Hashing to Elliptic Curves. RFC 9380: 1-145 (2023) - [i24]Tim Taubert, Christopher A. Wood:
SPAKE2+, an Augmented Password-Authenticated Key Exchange (PAKE) Protocol. RFC 9383: 1-25 (2023) - [i23]Tommy Pauly, Eric Kinnear, Christopher A. Wood, Patrick McManus, Tommy Jensen:
Discovery of Designated Resolvers. RFC 9462: 1-16 (2023) - [i22]Frank Denis, Frederic Jacobs, Christopher A. Wood:
RSA Blind Signatures. RFC 9474: 1-27 (2023) - [i21]Alex Davidson, Armando Faz-Hernández, Nick Sullivan, Christopher A. Wood:
Oblivious Pseudorandom Functions (OPRFs) Using Prime-Order Groups. RFC 9497: 1-61 (2023) - 2022
- [c28]Karthikeyan Bhargavan, Vincent Cheval, Christopher A. Wood:
A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello. CCS 2022: 365-379 - [c27]Nirvan Tyagi, Sofía Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood:
A Fast and Simple Partially Oblivious PRF, with Applications. EUROCRYPT (2) 2022: 674-705 - [c26]Sudheesh Singanamalla, Muhammad Talha Paracha, Suleman Ahmad, Jonathan Hoyland, Luke Valenta, Yevgen Safronov, Peter Wu, Andrew Galloni, Kurtis Heimerl, Nick Sullivan, Christopher A. Wood, Marwan Fayed:
Respect the ORIGIN!: a best-case evaluation of connection coalescing in the wild. IMC 2022: 664-678 - [c25]Bijeeta Pal, Mazharul Islam, Marina Sanusi Bohuk, Nick Sullivan, Luke Valenta, Tara Whalen, Christopher A. Wood, Thomas Ristenpart, Rahul Chatterjee:
Might I Get Pwned: A Second Generation Compromised Credential Checking Service. USENIX Security Symposium 2022: 1831-1848 - [i20]Ludovic Barman, Sandra Siby, Christopher A. Wood, Marwan Fayed, Nick Sullivan, Carmela Troncoso:
This is not the padding you are looking for! On the ineffectiveness of QUIC PADDING against website fingerprinting. CoRR abs/2203.07806 (2022) - [i19]Tommy Pauly, David Schinazi, Christopher A. Wood:
TLS Ticket Requests. RFC 9149: 1-8 (2022) - [i18]Richard L. Barnes, Karthikeyan Bhargavan, Benjamin Lipp, Christopher A. Wood:
Hybrid Public Key Encryption. RFC 9180: 1-107 (2022) - [i17]Eric Kinnear, Patrick McManus, Tommy Pauly, Tanya Verma, Christopher A. Wood:
Oblivious DNS over HTTPS. RFC 9230: 1-19 (2022) - [i16]Russ Housley, Jonathan Hoyland, Mohit Sethi, Christopher A. Wood:
Guidance for External Pre-Shared Key (PSK) Usage in TLS. RFC 9257: 1-13 (2022) - [i15]David Benjamin, Christopher A. Wood:
Importing External Pre-Shared Keys (PSKs) for TLS 1.3. RFC 9258: 1-11 (2022) - [i14]Martin Thomson, Christopher A. Wood:
Binary Representation of HTTP Messages. RFC 9292: 1-16 (2022) - 2021
- [j5]Sudheesh Singanamalla, Suphanat Chunhapanya, Jonathan Hoyland, Marek Vavrusa, Tanya Verma, Peter Wu, Marwan Fayed, Kurtis Heimerl, Nick Sullivan, Christopher A. Wood:
Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS. Proc. Priv. Enhancing Technol. 2021(4): 575-592 (2021) - [c24]Sofía Celi, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada, Luke Valenta, Thom Wiggers, Bas Westerbaan, Christopher A. Wood:
Implementing and Measuring KEMTLS. LATINCRYPT 2021: 88-107 - [c23]Marwan Fayed, Lorenz Bauer, Vasileios Giotsas, Sami Kerola, Marek Majkowski, Pavel Odintsov, Jakub Sitnicki, Taejoong Chung, Dave Levin, Alan Mislove, Christopher A. Wood, Nick Sullivan:
The ties that un-bind: decoupling IP from web services and sockets for robust addressing agility at CDN-scale. SIGCOMM 2021: 433-446 - [i13]Nirvan Tyagi, Sofía Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood:
A Fast and Simple Partially Oblivious PRF, with Applications. IACR Cryptol. ePrint Arch. 2021: 864 (2021) - [i12]Sofía Celi, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada, Luke Valenta, Thom Wiggers, Bas Westerbaan, Christopher A. Wood:
Implementing and Measuring KEMTLS. IACR Cryptol. ePrint Arch. 2021: 1019 (2021) - 2020
- [i11]Sudheesh Singanamalla, Suphanat Chunhapanya, Marek Vavrusa, Tanya Verma, Peter Wu, Marwan Fayed, Kurtis Heimerl, Nick Sullivan, Christopher A. Wood:
Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS. CoRR abs/2011.10121 (2020) - [i10]Bastiaan Wissingh, Christopher A. Wood, Alexander Afanasyev, Lixia Zhang, David Oran, Christian F. Tschudin:
Information-Centric Networking (ICN): Content-Centric Networking (CCNx) and Named Data Networking (NDN) Terminology. RFC 8793: 1-17 (2020) - [i9]Theresa Enghardt, Tommy Pauly, Colin Perkins, Kyle Rose, Christopher A. Wood:
A Survey of the Interaction between Security Protocols and Transport Services. RFC 8922: 1-19 (2020) - [i8]Cas Cremers, Luke Garratt, Stanislav Smyshlyaev, Nick Sullivan, Christopher A. Wood:
Randomness Improvements for Security Protocols. RFC 8937: 1-9 (2020)
2010 – 2019
- 2019
- [j4]Gergely Ács, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik, Christopher A. Wood:
Privacy-Aware Caching in Information-Centric Networking. IEEE Trans. Dependable Secur. Comput. 16(2): 313-328 (2019) - [i7]Marc Mosko, Ignacio Solis, Christopher A. Wood:
Content-Centric Networking (CCNx) Semantics. RFC 8569: 1-40 (2019) - [i6]Marc Mosko, Ignacio Solis, Christopher A. Wood:
Content-Centric Networking (CCNx) Messages in TLV Format. RFC 8609: 1-46 (2019) - 2017
- [b1]Christopher A. Wood:
Security and Privacy Challenges in Content-Centric Networks. University of California, Irvine, USA, 2017 - [j3]Edith C. H. Ngai, Börje Ohlman, Gene Tsudik, Ersin Uzun, Matthias Wählisch, Christopher A. Wood:
Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy. Comput. Commun. Rev. 47(1): 49-54 (2017) - [c22]Cesar Ghali, Gene Tsudik, Christopher A. Wood:
When encryption is not enough: privacy attacks in content-centric networking. ICN 2017: 1-10 - [c21]Marc Mosko, Christopher A. Wood:
Secure off-path replication in content-centric networks. ICC 2017: 1-7 - [c20]Cesar Ghali, Gene Tsudik, Ersin Uzun, Christopher A. Wood:
Closing the Floodgate with Stateless Content-Centric Networking. ICCCN 2017: 1-10 - [c19]Cesar Ghali, Gene Tsudik, Christopher A. Wood:
Mitigating On-Path Adversaries in Content-Centric Networks. LCN 2017: 27-34 - [c18]Ivan Oliveira Nunes, Gene Tsudik, Christopher A. Wood:
Namespace Tunnels in Content-Centric Networks. LCN 2017: 35-42 - [c17]Marc Mosko, Ersin Uzun, Christopher A. Wood:
Mobile sessions in content-centric networks. Networking 2017: 1-9 - [c16]Christopher A. Wood:
Protecting the long tail: Transparent packet security in content-centric networks. Networking 2017: 1-9 - [i5]Marc Mosko, Ignacio Solis, Christopher A. Wood:
Content-Centric Networking - Architectural Overview and Protocol Description. CoRR abs/1706.07165 (2017) - 2016
- [c15]Cesar Ghali, Gene Tsudik, Christopher A. Wood:
Network Names in Content-Centric Networking. ICN 2016: 132-141 - [c14]Gene Tsudik, Ersin Uzun, Christopher A. Wood:
AC3N: Anonymous communication in Content-Centric Networking. CCNC 2016: 988-991 - [c13]Christian F. Tschudin, Ersin Uzun, Christopher A. Wood:
Trust in Information-Centric Networking: From Theory to Practice. ICCCN 2016: 1-9 - [c12]Cesar Ghali, Gene Tsudik, Christopher A. Wood:
BEAD: Best effort autonomous deletion in content-centric networking. Networking 2016: 180-188 - [c11]Cesar Ghali, Gene Tsudik, Christopher A. Wood, Edmund Yeh:
Practical accounting in content-centric networking. NOMS 2016: 436-444 - [c10]Cesar Ghali, Gene Tsudik, Christopher A. Wood:
(The Futility of) Data Privacy in Content-Centric Networking. WPES@CCS 2016: 143-152 - 2015
- [j2]Christopher A. Wood, Jobby Jacob:
A complete L(2, 1) span characterization for small trees. AKCE Int. J. Graphs Comb. 12(1): 26-31 (2015) - [c9]Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood:
Interest-Based Access Control for Content Centric Networks. ICN 2015: 147-156 - [c8]Marc Mosko, Glenn Scott, Ignacio Solis, Christopher A. Wood:
Secure Name Configuration and Prefix Registration. ICN 2015: 197-198 - [c7]Glenn Scott, Christopher A. Wood:
A Network-Agnostic Data Framework and API for CCN. ICN 2015: 199-200 - [c6]Marc Mosko, Christopher A. Wood:
Secure Fragmentation for Content Centric Networking. MASS 2015: 506-512 - [c5]Christopher A. Wood, Stanislaw P. Radziszowski, Marcin Lukowiak:
Constructing large S-boxes with area minimized implementations. MILCOM 2015: 49-54 - [c4]Cesar Ghali, Ashok Narayanan, David Oran, Gene Tsudik, Christopher A. Wood:
Secure Fragmentation for Content-Centric Networks. NCA 2015: 47-56 - [c3]Jun Kurihara, Ersin Uzun, Christopher A. Wood:
An encryption-based access control framework for content-centric networking. Networking 2015: 1-9 - [i4]Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood:
Interest-Based Access Control for Content Centric Networks (extended version). CoRR abs/1505.06258 (2015) - [i3]Cesar Ghali, Gene Tsudik, Christopher A. Wood, Edmund Yeh:
Practical Accounting in Content-Centric Networking (extended version). CoRR abs/1510.01852 (2015) - [i2]Cesar Ghali, Gene Tsudik, Christopher A. Wood:
BEAD: Best Effort Autonomous Deletion in Content-Centric Networking. CoRR abs/1512.07311 (2015) - [i1]Cesar Ghali, Gene Tsudik, Ersin Uzun, Christopher A. Wood:
Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking. CoRR abs/1512.07755 (2015) - 2014
- [j1]Marcin Lukowiak, Stanislaw P. Radziszowski, James R. Vallino, Christopher A. Wood:
Cybersecurity Education: Bridging the Gap Between Hardware and Software Domains. ACM Trans. Comput. Educ. 14(1): 2:1-2:20 (2014) - [c2]Sam Skalicky, Sonia López, Marcin Lukowiak, Christopher A. Wood:
Mission control: A performance metric and analysis of control logic for pipelined architectures on FPGAs. ReConFig 2014: 1-6 - 2013
- [c1]Sam Skalicky, Christopher A. Wood, Marcin Lukowiak, Matthew Ryan:
High level synthesis: Where are we? A case study on matrix multiplication. ReConFig 2013: 1-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint