You are here

Bibliography

Export 10 results:
Author Title Type [ Year(Asc)]
Filters: Author is Nicholas J. Hopper  [Clear All Filters]
2011
Lofgren P, Hopper NJ. BNymble: More anonymous blacklisting at almost no cost. In: FC'11 - Proceedings of Financial Cryptography and Data Security . FC'11 - Proceedings of Financial Cryptography and Data Security . St. Lucia; 2011.
Lofgren P, Hopper NJ. FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting. In: WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society. WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society. Chicago, IL, United States: ACM; 2011.
2010
Hopper NJ, Vasserman EY, Chan-Tin E. How Much Anonymity does Network Latency Leak?. ACM Transactions on Information and System Security [Internet]. 2010 :82 - 91. Available from: http://portal.acm.org/citation.cfm?id=1315245.1315257
2009
Tran A, Hopper NJ, Kim Y. Hashing it out in public: Common failure modes of DHT-based anonymity schemes. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM; 2009. Available from: http://portal.acm.org/citation.cfm?id=1655188.1655199
Vasserman EY, Jansen R, Tyra J, Hopper NJ, Kim Y. Membership-concealing overlay networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 390–399. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653709
McLachlan J, Hopper NJ. On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM; 2009. Available from: http://portal.acm.org/citation.cfm?id=1655193
McLachlan J, Tran A, Hopper NJ, Kim Y. Scalable onion routing with Torsk. In: Proceedings of CCS 2009. Proceedings of CCS 2009. ACM New York, NY, USA; 2009. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653733
2008
Shimshock E, Staats M, Hopper NJ. Breaking and Provably Fixing Minx. In: Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 99–114. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428266
McLachlan J, Hopper NJ. Don't Clog the Queue: Circuit Clogging and Mitigation in P2P anonymity schemes. In: Proceedings of Financial Cryptography (FC '08). Proceedings of Financial Cryptography (FC '08). Springer-Verlag Berlin, Heidelberg; 2008. Available from: http://portal.acm.org/citation.cfm?id=1428551
2003
von Ahn L, Bortz A, Hopper NJ. k-Anonymous Message Transmission. In: Conference on Computer and Communications Security. Conference on Computer and Communications Security. Washington D.C., USA: ACM New York, NY, USA; 2003. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.9.9348&rep=rep1&type=url&i=2