Search

Your search keyword '"Nikita Borisov"' showing total 145 results

Search Constraints

Start Over You searched for: Author "Nikita Borisov" Remove constraint Author: "Nikita Borisov"
145 results on '"Nikita Borisov"'

Search Results

101. Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems

102. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses

103. Do You Hear What I Hear?

104. Re 3

105. Analyzing an adaptive reputation metric for anonymity systems

106. The Ninja architecture for robust Internet-scale systems and services

107. The Need for Flow Fingerprints to Link Correlated Network Flows

108. POSTER: PnP

109. Securing Anonymous Communication Channels under the Selective DoS Attack

110. SWEET: Serving the Web by Exploiting Email Tunnels

111. SybilControl

112. Cirripede

113. Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting

114. EASiER

115. CoCo: Coding-Based Covert Timing Channels for Network Flows

116. Stegobot: A Covert Social Network Botnet

117. P3CA: Private Anomaly Detection Across ISP Networks

119. In search of an anonymous and secure lookup

120. Fingerprinting websites using remote traffic analysis

121. Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

122. Attacking and Repairing the Improved ModOnions Protocol

123. Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach

124. ShadowWalker

126. Multi-flow attack resistant watermarks for network flows

127. FlyByNight

128. Secure aggregation in a publish-subscribe system

129. Information leaks in structured peer-to-peer anonymous communication systems

130. High-Speed Matching of Vulnerability Signatures

131. Deleting index entries from compliance storage

132. Workshop 18 introduction: Fifth International Workshop on Hot Topics in Peer-to-Peer Systems - HOTP2P

133. Improving multi-tier security using redundant authentication

134. A privacy-preserving interdomain audit framework

135. Outsourcing Security Analysis with Anonymized Logs

136. Breaking the Collusion Detection Mechanism of MorphMix

137. An Analysis of Parallel Mixing with Attacker-Controlled Inputs

138. Challenges in Wireless Security

139. Off-the-record communication, or, why not to use PGP

140. Intercepting mobile communications

141. Privacy Enhancing Technologies : 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

142. Privacy Enhancing Technologies : 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers

143. Meditsinskiy aspekt reabilitatsii bol'nykhishemicheskoy bolezn'yu serdtsana sanatornom etape

Catalog

Books, media, physical & digital resources