Found 178 results
In Press
Harrison, W. L., D. Andrews, and G. Allwein, "Simulation Logic", Logic and Logical Philosophy, In Press. 12-1231-2384.pdf (281.37 KB)
West, N., D. Geiger, and G. Scheets, "Accelerating Software Radio on ARM: Adding NEON Support to VOLK", IEEE Radio and Wireless Symposium, 11/2014. 14-1231-2162.pdf (1.1 MB)
Allwein, G., and W. L. Harrison, "Distributed Logics", NRL Memorandum Report, no. 9565, 2014. 14-1231-3181.pdf (583.12 KB)
Jansen, R., A. Miller, P. Syverson, and B. Ford, "From Onions to Shallots: Rewarding Tor Relays with TEARS", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014. 14-1231-1482.pdf (425.98 KB)
Geddes, J., R. Jansen, and N. Hopper, "IMUX: Managing Tor Connections from Two to Infinity, and Beyond", Workshop on Privacy in Electronic Society (WPES), 11/2014. 14-1231-3002.pdf (1.54 MB)
Jansen, R., J. Geddes, C. Wacek, M. Sherr, and P. Syverson, "Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport", 23rd Usenix Security Symposium, 08/2014. 14-1231-2094.pdf (1.26 MB)
Jaggard, A. D., A. Johnson, P. Syverson, and J. Feigenbaum, "Representing Network Trust and Using it to Improve Anonymous Communication", Privacy Enhancing Technologies Symposium, 07/2014. 14-1231-1483.pdf (1.15 MB)
Jansen, R., F. Tschorsch, A. Johnson, and B. Scheuermann, "The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network", 21st Annual Network & Distributed System Security Symposium (NDSS '14), 12/2013, 2014. 13-1231-3743.pdf (552.48 KB)
Ghosh, M., M. Richardson, B. Ford, and R. Jansen, "A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014. 14-1231-1559.pdf (837.86 KB)
West, N., D. Geiger, and G. Scheets, "Benchmarking GNU Radio Kernels and Multi-Processor Scheduling", New England Workshop for Software Defined Radio (NEWSDR'13), Worcester, Massachusetts , 2013. 13-1231-0717.pdf (693.04 KB)
Jansen, R., A. Johnson, and P. Syverson, "LIRA: Lightweight Incentivized Routing for Anonymity", 20th Annual Network & Distributed System Security Symposium (NDSS '13), 2013. Jansen etal2013.pdf (1.14 MB)
Syta, E., A. Johnson, H. Corrigan-Gibbs, S-C. Weng, D. Wolinsky, and B. Ford, "Security Analysis of Accountable Anonymous Group Communication in Dissent", Yale University Technical Report, no. YALEU/DCS/TR-1472, 2013. 13-1231-0835.pdf (436.64 KB)
Jr., J. Kirby, "Specifying Software Behavior for Requirements and Design", Journal of Systemics, Cybernetics, and Informatics, vol. 11, issue 8, 2013. 13-1231-2853.pdf (108.65 KB)
Johnson, A., C. Wacek, R. Jansen, M. Sherr, and P. Syverson, "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries", 20th ACM Conference on Computer and Communications Security, 11/2013. 13-1231-2077.pdf (2.99 MB)
Jansen, R., K. Bauer, N. Hopper, and R. Dingledine, "Methodically Modeling the Tor Network", Workshop on Cyber Security Experimentation and Test (CSET), 2012. 12-1231-2496.pdf (598.31 KB)
Feigenbaum, J., A. Johnson, and P. Syverson, "Probabilistic Analysis of Onion Routing in a Black-box Model", ACM Transactions on Information and System Security (TISSEC), vol. 15, issue 3, 2012. Feigenbaum etal2012.pdf (363.26 KB)
Wolinsky, D. Isaac, H. Corrigan-Gibbs, B. Ford, and A. Johnson, "Scalable Anonymous Group Communication in the Anytrust Model", Fifth European Workshop on System Security (EuroSec 2012), 2012. Wolinsky etal2012b.pdf (280.01 KB)
Jansen, R., and N. Hopper, "Shadow: Running Tor in a Box for Accurate and Efficient Experimentation", Symposium on Network and Distributed System Security (NDSS), 2012. 11-1226-3413.pdf (1.13 MB)
Wolinsky, D. Isaac, H. Corrigan-Gibbs, B. Ford, and A. Johnson, "Strong, Scalable Anonymity in Dissent", Tenth USENIX Symposium on Operating Systems Design and Implementation (OSDI '12), 2012. Wolinsky etal2012.pdf (898.57 KB)
Jansen, R., P. Syverson, and N. Hopper, "Throttling Tor Bandwidth Parasites", USENIX Security Symposium, 2012. 12-1231-2049.pdf (1.13 MB)
Johnson, A., P. Syverson, R. Dingledine, and N. Mathewson, "Truth-based Anonymous Communication: Adversary Models and Routing Algorithms", Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), 2011. Johnson etal2011.pdf (320.76 KB)
Jeffords, R., C. L. Heitmeyer, M. Archer, and E. Leonard, "A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition", Formal Methods, Second World Congress (FM 2009), Eindhoven, The Netherlands, pp. 173-189, 2009. Jeffords etal2009.pdf (144.97 KB)