Kevin P. Dyer
Kevin P. Dyer
Bestätigte E-Mail-Adresse bei google.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
IEEE Symposium on Security and Privacy 2012, 2012
3182012
Protocol misidentification made easy with format-transforming encryption
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1162013
Seeing through network-protocol obfuscation
L Wang, KP Dyer, A Akella, T Ristenpart, T Shrimpton
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
592015
Traffic analysis of encrypted messaging services: Apple imessage and beyond
SE Coull, KP Dyer
ACM SIGCOMM Computer Communication Review 44 (5), 5-11, 2014
572014
Marionette: A programmable network traffic obfuscation system
KP Dyer, SE Coull, T Shrimpton
24th {USENIX} Security Symposium ({USENIX} Security 15), 367-382, 2015
452015
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
D Luchaup, KP Dyer, S Jha, T Ristenpart, T Shrimpton
USENIX Security 2014, 2014
292014
Novel Cryptographic Primitives and Protocols for Censorship Resistance
KP Dyer
Portland State University, 2015
2015
Cryptanalysis of the SHA Family of Hash Functions
KP Dyer
Royal Holloway, University of London, 2007
2007
Linear cryptanalysis of two round 16 step MD5 over the rationals
KP Dyer, EF Schaefer
Southern Africa Mathematical Sciences Association, 2005, 2005
2005
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–9