Found 193 results
"Simulation Logic", Logic and Logical Philosophy, In Press.
"The Analysis and Prediction of Eye Gaze When Viewing Statistical Graphs", International Conference on Augmented Cognition, Vancouver, Canada, Springer, pp. 148-165, 05/2017.
"Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection", Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017), 2017.
"Big Data, Little Security: Addressing Security Issues in your Platform", SPIE Proceedings, Next-Generation Analyst V, Anaheim, California, SPIE Defense + Security, pp. 1-10, 05/2017.
Commonality and Variability Analysis for Xenon Family of Separation Virtual Machine Monitors (CVAX), , 2017.
"Distributed Measurement with Private Set-Union Cardinality", The 24th ACM Conference on Computer and Communications Security (CCS 2017), 10/2017.
"Federated Cybersecurity Policy Arbitration", NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience, Munich, Germany, International Journal of Security and Networks, pp. 83-85, 10/2017.
"The Once and Future Onion", Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017) , 07/2017.
"Stealthy Protocols: Metrics and Open Problems", Proceedings of Concurrency, Security, and Puzzles, pp. 1-17, 01/2017.
"Bake in .onion for Tear-Free and Stronger Website Authentication", IEEE Security & Privacy Magazine, 2016.
"PeerFlow: Secure Load Balancing in Tor", Proceedings on Privacy Enhancing Technologies, vol. 2017, issue 2, 12/2016.
"Safely Measuring Tor", 23rd ACM Conference on Computer and Communications Security, 10/2016.
"20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables Proceedings on Privacy Enhancing Technologies", Proceedings on Privacy Enhancing Technologies, vol. 1, issue 1, pp. 4-24, 04/2015.
"Defending Tor from Network Adversaries: A Case Study of Network Path Prediction", Proceedings on Privacy Enhancing Technologies, vol. 1, 05/2015.
"Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication", IEEE Workshop on Web 2.0 Security & Privacy, 05/2015.
"Hidden-service statistics reported by relays", NRL Technical Reports, no. 2015-04-001, 06/2015.
"Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications", 8th Workshop on Cyber Security Experimentation and Test (CSET), 08/2015.
"Accelerating Software Radio on ARM: Adding NEON Support to VOLK", IEEE Radio and Wireless Symposium, 11/2014.
"Distributed Logics", NRL Memorandum Report, no. 9565, 2014.
"From Onions to Shallots: Rewarding Tor Relays with TEARS", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.
"IMUX: Managing Tor Connections from Two to Infinity, and Beyond", Workshop on Privacy in Electronic Society (WPES), 11/2014.
"Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport", 23rd Usenix Security Symposium, 08/2014.
"Representing Network Trust and Using it to Improve Anonymous Communication", Privacy Enhancing Technologies Symposium, 07/2014.
"The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network", 21st Annual Network & Distributed System Security Symposium (NDSS '14), 12/2013, 2014.
"A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.