You are here

Bibliography

Export 7 results:
Author Title Type [ Year(Asc)]
Filters: Author is Kevin Bauer  [Clear All Filters]
2012
Wang T, Bauer K, Forero C, Goldberg I. Congestion-aware Path Selection for Tor. In: FC'12 - Proceedings of the 16th International Conference in Financial Cryptography and Data Security . FC'12 - Proceedings of the 16th International Conference in Financial Cryptography and Data Security . Bonaire; 2012.
2011
AlSabah M, Bauer K, Goldberg I, Grunwald D, McCoy D, Savage S, Voelker GM. DefenestraTor: Throwing out Windows in Tor. In: PETS'11 - Proceedings of the 11th Privacy Enhancing Technologies Symposium . PETS'11 - Proceedings of the 11th Privacy Enhancing Technologies Symposium . Waterloo, Canada; 2011.
Bauer K, Sherr M, McCoy D, Grunwald D. ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation. In: CSET'11 - Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test. CSET'11 - Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test. San Francisco, CA, USA; 2011.
Bauer K. Improving Security and Performance in Low Latency Anonymity Networks. Computer science. 2011 :240.
2008
Bauer K, McCoy D, Grunwald D, Sicker D. BitBlender: Light-Weight Anonymity for BitTorrent. In: Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008). Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008). Istanbul, Turkey: ACM; 2008. Available from: http://portal.acm.org/citation.cfm?id=1461465
McCoy D, Bauer K, Grunwald D, Kohno T, Sicker D. Shining Light in Dark Places: Understanding the Tor Network. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 63–76. Available from: http://portal.acm.org/citation.cfm?id=1428264
2007
Bauer K, McCoy D, Grunwald D, Kohno T, Sicker D. Low-Resource Routing Attacks Against Tor. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007). Washington, DC, USA: ACM New York, NY, USA; 2007. Available from: http://portal.acm.org/citation.cfm?id=1314336