150 results on '"Nicholas Hopper"'
Search Results
2. DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.
3. Padding-only Defenses Add Delay in Tor.
4. End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability.
5. MP3: A More Efficient Private Presence Protocol.
6. Measuring Information Leakage in Website Fingerprinting Attacks and Defenses.
7. Privacy-Preserving Dynamic Learning of Tor Network Traffic.
8. Understanding hydrogen pressure control of furfural hydrogenation selectivity on a Pd(1 1 1) model catalyst
9. Reply to 'Comment on ‘Anisotropy of Shear-Induced Mechanochemical Reaction Rates of Surface Adsorbates; Implications for Theoretical Models’'
10. Is Bob Sending Mixed Signals?
11. End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage.
12. The Cost of the Path Not Taken.
13. ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding Bottlenecks.
14. Anisotropy of Shear-Induced Mechanochemical Reaction Rates of Surface Adsorbates; Implications for Theoretical Models
15. Challenges in Protecting Tor Hidden Services from Botnet Abuse.
16. IMUX: Managing Tor Connections from Two to Infinity, and Beyond.
17. Exploring mechanochemical reactions at the nanoscale: theory versus experiment
18. How Low Can You Go: Balancing Performance with Anonymity in Tor.
19. Peer Pressure: Exerting Malicious Influence on Routers at a Distance.
20. Improved group off-the-record messaging.
21. Cover your ACKs: pitfalls of covert channel censorship circumvention.
22. Efficient Private Proximity Testing with GSM Location Sketches.
23. New Attacks on Timing-based Network Flow Watermarks.
24. Throttling Tor Bandwidth Parasites.
25. Routing around decoys.
26. Understanding Social Networks Properties for Trustworthy Computing.
27. BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper).
28. FAUST: efficient, TTP-free abuse prevention by anonymous whitelisting.
29. Keep your friends close: Incorporating trust into social network-based Sybil defenses.
30. Jack: scalable accumulator-based nymble system.
31. Balancing the shadows.
32. Recruiting new tor relays with BRAIDS.
33. Why Kad Lookup Fails.
34. On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design.
35. Hashing it out in public: common failure modes of DHT-based anonymity schemes.
36. The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems.
37. Towards complete node enumeration in a peer-to-peer botnet.
38. Scalable onion routing with torsk.
39. Membership-concealing overlay networks.
40. Breaking and Provably Fixing Minx.
41. Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes.
42. Surface Chemistry at the Solid‐Solid Interface; Selectivity and Activity in Mechanochemical Reactions on Surfaces
43. From Weak to Strong Watermarking.
44. How much anonymity does network latency leak?
45. SilentKnock: Practical, Provably Undetectable Authentication.
46. Timed-Release and Key-Insulated Public Key Encryption.
47. On the effectiveness of k;-anonymity against traffic analysis and surveillance.
48. On Steganographic Chosen Covertext Security.
49. Binding of Oxygen on Single-Atom Sites on Au/Pd(100) Alloys with High Gold Coverages
50. Adsorption and reaction pathways of 7-octenoic acid on copper
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.