175 results on '"Nikita Borisov"'
Search Results
2. ProbFlow : Using Probabilistic Programming in Anonymous Communication Networks.
3. Detecting AI Trojans Using Meta Neural Analysis.
4. Assessing the Privacy Benefits of Domain Name Encryption.
5. Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild.
6. Conjure: Summoning Proxies from Unused Address Space.
7. What can you learn from an IP?
8. TightRope: Towards Optimal Load-balancing of Paths in Anonymous Networks.
9. The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors.
10. Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations.
11. SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts.
12. Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises.
13. Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems.
14. An ISP-Scale Deployment of TapDance.
15. Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components.
16. Re3: relay reliability reputation for anonymity systems.
17. MLEFlow: Learning from History to Improve Load Balancing in Tor
18. Pisces: Anonymous Communication Using Social Networks.
19. The Need for Flow Fingerprints to Link Correlated Network Flows.
20. Securing Anonymous Communication Channels under the Selective DoS Attack.
21. PnP: improving web browsing performance over tor using web resource prefetch-and-push.
22. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.
23. Cachet: a decentralized architecture for privacy preserving social networking with caching.
24. Website Detection Using Remote Traffic Analysis.
25. Octopus: A Secure and Anonymous DHT Lookup.
26. CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing.
27. DECENT: A decentralized architecture for enforcing privacy in online social networks.
28. CoCo: Coding-Based Covert Timing Channels for Network Flows.
29. Stegobot: A Covert Social Network Botnet.
30. P3CA: Private Anomaly Detection Across ISP Networks.
31. Towards improving network flow watermarks using the repeat-accumulate codes.
32. EASiER: encryption-based access control in social networks with efficient revocation.
33. Confidentiality-preserving proof theories for distributed proof systems.
34. Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.
35. Cirripede: circumvention infrastructure using router redirection with plausible deniability.
36. An ISP-Scale Deployment of TapDance.
37. BotGrep: Finding P2P Bots with Structured Graph Analysis.
38. Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks.
39. Protecting location privacy against inference attacks.
40. In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.
41. Safety in discretionary access control for logic-based publish-subscribe systems.
42. Attacking and Repairing the Improved ModOnions Protocol.
43. Multi-flow attack resistant watermarks for network flows.
44. ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies.
45. Confidentiality-preserving distributed proofs of conjunctive queries.
46. Deleting index entries from compliance storage.
47. Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance.
48. Multi-flow Attacks Against Network Flow Watermarking Schemes.
49. FlyByNight: mitigating the privacy risks of social networking.
50. Secure aggregation in a publish-subscribe system.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.