You are here

Bibliography

Export 6 results:
Author Title Type [ Year(Asc)]
Filters: Author is Somesh Jha  [Clear All Filters]
2009
Edman M, Syverson P. AS-awareness in Tor path selection. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 380–389. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653708
Troncoso C, Danezis G. The bayesian traffic analysis of mix networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 369–379. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653707
Vasserman EY, Jansen R, Tyra J, Hopper NJ, Kim Y. Membership-concealing overlay networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 390–399. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653709
2008
Wang W, Motani M, Srinivasan V. Dependent Link Padding Algorithms for Low Latency Anonymity Systems. In: Syverson P, Jha S, Zhang X {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. Alexandria, Virginia, USA: ACM Press; 2008. pp. 323–332. Available from: http://portal.acm.org/citation.cfm?id=1455812
Mittal P, Borisov N. Information Leaks in Structured Peer-to-peer Anonymous Communication Systems. In: Syverson P, Jha S, Zhang X Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Alexandria, Virginia, USA: ACM Press; 2008. pp. 267–278. Available from: http://portal.acm.org/citation.cfm?id=1455805
Tsang PP, Au MH, Kapadia A, Smith S. PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication. In: Syverson P, Jha S, Zhang X {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. Alexandria, Virginia, USA: ACM Press; 2008. pp. 333–345. Available from: http://portal.acm.org/citation.cfm?id=1455813