You are here

Bibliography

Export 25 results:
Author Title Type [ Year(Asc)]
Filters: Author is Borisov, Nikita  [Clear All Filters]
2014
Borisov N, Danezis G, Goldberg I. DP5: A Private Presence Service. Centre for Applied Cryptographic Research (CACR), University of Waterloo. 2014 .
2011
Houmansadr A, Nguyen GTK, Caesar M, Borisov N. Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability. In: CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. Chicago, IL, United States: ACM; 2011.
Mittal P, Olumofin F, Troncoso C, Borisov N, Goldberg I. PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. In: Proceedings of the 20th USENIX Security Symposium. Proceedings of the 20th USENIX Security Symposium. San Francisco, CA, USA; 2011.
Mittal P, Khurshid A, Juen J, Caesar M, Borisov N. Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting. In: CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. Chicago, IL, United States: ACM; 2011.
Houmansadr A, Borisov N. SWIRL: A Scalable Watermark to Detect Correlated Network Flows. In: NDSS'11 - Proceedings of the Network and Distributed Security Symposium. NDSS'11 - Proceedings of the Network and Distributed Security Symposium. San Diego, CA, USA; 2011.
Mittal P, Caesar M, Borisov N. X-Vine: Secure and Pseudonymous Routing Using Social Networks. Computer Research Repository [Internet]. 2011 ;abs/1109.0971. Available from: http://dblp.uni-trier.de/db/journals/corr/corr1109.html#abs-1109-0971
2009
Mittal P, Borisov N. ShadowWalker: Peer-to-peer Anonymous Communication Using Redundant Structured Topologies. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. Proceedings of the 16th ACM Conference on Computer and Communications Security. New York, NY, USA: ACM; 2009. Available from: http://doi.acm.org/10.1145/1653662.1653683
2008
Danezis G, Syverson P. Bridging and Fingerprinting: Epistemic Attacks on Route Selection. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 133–150. Available from: http://www.springerlink.com/content/q2r7g81286026576/
Danezis G, Sassaman L. How to Bypass Two Anonymity Revocation Systems. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 187–201. Available from: http://www.springerlink.com/content/179453h161722821/
Diaz C, Troncoso C, Serjantov A. On the Impact of Social Network Profiling on Anonymity. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 44–62. Available from: http://portal.acm.org/citation.cfm?id=1428263
Mittal P, Borisov N. Information Leaks in Structured Peer-to-peer Anonymous Communication Systems. In: Syverson P, Jha S, Zhang X Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Alexandria, Virginia, USA: ACM Press; 2008. pp. 267–278. Available from: http://portal.acm.org/citation.cfm?id=1455805
Murdoch SJ, Watson RNM. Metrics for Security and Performance in Low-Latency Anonymity Networks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 115–132. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428267
Androulaki E, Raykova M, Srivatsan S, Stavrou A, Bellovin SM. PAR: Payment for Anonymous Routing. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 219–236. Available from: http://www.springerlink.com/content/r1h1046823587382/
Troncoso C, Gierlichs B, Preneel B, Verbauwhede I. Perfect Matching Statistical Disclosure Attacks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 2–23. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.4953
Androulaki E, Choi SG, Bellovin SM, Malkin T. Reputation Systems for Anonymous Networks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 202–218. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428272
McCoy D, Bauer K, Grunwald D, Kohno T, Sicker D. Shining Light in Dark Places: Understanding the Tor Network. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 63–76. Available from: http://portal.acm.org/citation.cfm?id=1428264
Snader R, Borisov N. A Tune-up for Tor: Improving Security and Performance in the Tor Network. In: Proceedings of the Network and Distributed Security Symposium - NDSS '08. Proceedings of the Network and Distributed Security Symposium - NDSS '08. Internet Society; 2008. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.7368
2007
Borisov N, Danezis G, Mittal P, Tabriz P. Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity. In: Proceedings of CCS 2007. Proceedings of CCS 2007. ACM New York, NY, USA; 2007. Available from: http://portal.acm.org/citation.cfm?id=1315258
Øverlier L, Syverson P. Improving Efficiency and Simplicity of Tor circuit establishment and hidden services. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007. Available from: http://www.springerlink.com/content/j68v312681l8v874/
Murdoch SJ, Zieliński P. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007.
Danezis G, Diaz C, Troncoso C. Two-Sided Statistical Disclosure Attack. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.7347
2006
Tabriz P, Borisov N. Breaking the Collusion Detection Mechanism of MorphMix. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 368–384. Available from: http://www.springerlink.com/content/p2612108665331n7/
2005
Borisov N. An Analysis of Parallel Mixing with Attacker-Controlled Inputs. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Springer Berlin / Heidelberg; 2005. pp. 12–25. Available from: http://www.springerlink.com/content/b0t0714165846m42/
Borisov N, Waddle J. Anonymity in Structured Peer-to-Peer Networks. [Internet]. 2005 . Available from: http://www.eecs.berkeley.edu/Pubs/TechRpts/2005/6509.html