Found 10 results
Filters: Author is Jansen, Rob [Clear All Filters]
"Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications", 8th Workshop on Cyber Security Experimentation and Test (CSET), 08/2015.
"From Onions to Shallots: Rewarding Tor Relays with TEARS", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.
"Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport", 23rd Usenix Security Symposium, 08/2014.
"The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network", 21st Annual Network & Distributed System Security Symposium (NDSS '14), 12/2013, 2014.
"A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.
"LIRA: Lightweight Incentivized Routing for Anonymity", 20th Annual Network & Distributed System Security Symposium (NDSS '13), 2013.
"Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries", 20th ACM Conference on Computer and Communications Security, 11/2013.
"Methodically Modeling the Tor Network", Workshop on Cyber Security Experimentation and Test (CSET), 2012.
"Shadow: Running Tor in a Box for Accurate and Efficient Experimentation", Symposium on Network and Distributed System Security (NDSS), 2012.
"Throttling Tor Bandwidth Parasites", USENIX Security Symposium, 2012.