You are here

Bibliography

Export 12 results:
Author Title Type [ Year(Asc)]
Filters: Author is Brian Neil Levine  [Clear All Filters]
2011
Prusty S, Levine BN, Liberatore M. Forensic investigation of the OneSwarm anonymous filesharing system. In: Proceedings of the 18th ACM conference on Computer and communications security. Proceedings of the 18th ACM conference on Computer and communications security. New York, NY, USA: ACM; 2011. pp. 201–214.
2006
Liberatore M, Levine BN. Inferring the Source of Encrypted HTTP Connections. In: Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006). Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006). ACM New York, NY, USA; 2006. pp. 255–263. Available from: http://portal.acm.org/citation.cfm?id=1180437
Levine BN, Shields C, Margolin BN. A Survey of Solutions to the Sybil Attack. Amherst, MA: University of Massachusetts Amherst; 2006. Available from: http://prisms.cs.umass.edu/brian/pubs/levine.sybil.tr.2006.pdf
2005
Bissias GD, Liberatore M, Levine BN. Privacy Vulnerabilities in Encrypted HTTP Streams. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Springer Berlin / Heidelberg; 2005. pp. 1–11. Available from: http://www.springerlink.com/content/1062w684754754h4/
2004
Wright M, Adler M, Levine BN, Shields C. The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems. ACM Transactions on Information and System Security (TISSEC) [Internet]. 2004 ;7(4):489–522. Available from: http://portal.acm.org/citation.cfm?id=1042031.1042032&coll=GUIDE&dl=GUIDE&CFID=76057600&CFTOKEN=15386893
Levine BN, Reiter MK, Wang C, Wright M. Timing Attacks in Low-Latency Mix-Based Systems. In: Juels A Proceedings of Financial Cryptography (FC '04). Proceedings of Financial Cryptography (FC '04). Springer-Verlag, LNCS 3110; 2004. pp. 251–265. Available from: http://www.springerlink.com/content/n4khdtwk7dqvj0u0/
2003
Wright M, Adler M, Levine BN, Shields C. Defending Anonymous Communication Against Passive Logging Attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy. Proceedings of the 2003 IEEE Symposium on Security and Privacy. IEEE Computer Society Washington, DC, USA; 2003. pp. 28–43. Available from: http://portal.acm.org/citation.cfm?id=830556
2002
Wright M, Adler M, Levine BN, Shields C. An Analysis of the Degradation of Anonymous Protocols. In: Proceedings of the Network and Distributed Security Symposium - NDSS '02. Proceedings of the Network and Distributed Security Symposium - NDSS '02. IEEE; 2002. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.9435
Levine BN, Shields C. Hordes –- A Multicast Based Protocol for Anonymity. Journal of Computer Security [Internet]. 2002 ;10:213–240. Available from: http://portal.acm.org/citation.cfm?id=603406
2001
Wright M, Adler M, Levine BN, Shields C. An Analysis of the Degradation of Anonymous Protocols. In: Network and Distributed System Security Symposium. Network and Distributed System Security Symposium. San Diego, California; 2001. Available from: http://freehaven.net/anonbib/cache/wright02.pdf
Scarlata V, Levine BN, Shields C. Responder Anonymity and Anonymous Peer-to-Peer File Sharing. In: Network Protocols, 2001. Ninth International Conference on . Network Protocols, 2001. Ninth International Conference on . ; 2001. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.20.7821&rep=rep1&type=url&i=0
2000
Shields C, Levine BN. A Protocol for Anonymous Communication Over the Internet. In: In ACM Conference on Computer and Communications Security. In ACM Conference on Computer and Communications Security. ACM Press; 2000. pp. 33–42. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.37.3890&rep=rep1&type=url&i=0