Folgen
Aaron Johnson
Aaron Johnson
Bestätigte E-Mail-Adresse bei nrl.navy.mil - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
A Johnson, C Wacek, R Jansen, M Sherr, P Syverson
3942013
Dissent in numbers: making strong anonymity scale
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
Proceedings of the 10th USENIX conference on Operating Systems Design and …, 2012
2812012
Privacy-preserving data exploration in genome-wide association studies
A Johnson, V Shmatikov
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
2572013
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network
R Jansen, F Tschorsch, A Johnson, B Scheuermann
Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, USA, 2014
1692014
Probabilistic analysis of onion routing in a black-box model
J Feigenbaum, A Johnson, P Syverson
ACM Transactions on Information and System Security (TISSEC) 15 (3), 1-28, 2012
1642012
Probabilistic analysis of onion routing in a black-box model
J Feigenbaum, A Johnson, P Syverson
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 1-10, 2007
164*2007
A model of onion routing with provable anonymity
J Feigenbaum, A Johnson, P Syverson
International Conference on Financial Cryptography and Data Security, 57-71, 2007
1412007
Understanding tor usage with privacy-preserving measurement
A Mani, T Wilson-Brown, R Jansen, A Johnson, M Sherr
Proceedings of the Internet Measurement Conference 2018, 175-187, 2018
1052018
Safely Measuring Tor
R Jansen, A Johnson
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
982016
Private web search
F Saint-Jean, A Johnson, D Boneh, J Feigenbaum
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 84-90, 2007
882007
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction.
J Juen, A Johnson, A Das, N Borisov, M Caesar
PoPETs 2015 (2), 171-187, 2015
692015
Trust-based anonymous communication: adversary models and routing algorithms
AM Johnson, P Syverson, R Dingledine, N Mathewson
Proceedings of the 18th ACM conference on Computer and communications …, 2011
632011
LIRA: Lightweight Incentivized Routing for Anonymity
R Jansen, A Johnson, P Syverson
the 20th Network and Distributed System Security Symposium.(February 2013), 2013
592013
Scalable anonymous group communication in the anytrust model
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
European Workshop on System Security (EuroSec) 4, 2012
582012
PeerFlow: Secure Load Balancing in Tor
A Johnson, R Jansen, N Hopper, A Segal, P Syverson
Proceedings on Privacy Enhancing Technologies 2017 (2), 74-94, 2017
532017
Preventing active timing attacks in low-latency anonymous communication
J Feigenbaum, A Johnson, P Syverson
Privacy Enhancing Technologies, 166-183, 2010
44*2010
More anonymous onion routing through trust
A Johnson, P Syverson
Computer Security Foundations Symposium, 2009. CSF'09. 22nd IEEE, 3-12, 2009
402009
Security analysis of accountable anonymous group communication in Dissent
E Syta, A Johnson, H Corrigan-Gibbs, SC Weng, D Wolinsky, B Ford
YALE UNIV NEW HAVEN CT DEPT OF COMPUTER SCIENCE, 2013
35*2013
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection
A Johnson, R Jansen, AD Jaggard, J Feigenbaum, P Syverson
24th Network and Distributed System Security Symposium (NDSS 2017), 2017
342017
Security analysis of accountable anonymity in Dissent
E Syta, H Corrigan-Gibbs, SC Weng, D Wolinsky, B Ford, A Johnson
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-35, 2014
322014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20