2009 |
11 | EE | Brent ByungHoon Kang,
Eric Chan-Tin,
Christopher P. Lee,
James Tyra,
Hun Jeong Kang,
Chris Nunnery,
Zachariah Wadler,
Greg Sinclair,
Nicholas Hopper,
David Dagon,
Yongdae Kim:
Towards complete node enumeration in a peer-to-peer botnet.
ASIACCS 2009: 23-34 |
2008 |
10 | EE | Jon McLachlan,
Nicholas Hopper:
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes.
Financial Cryptography 2008: 31-46 |
9 | EE | Jung Hee Cheon,
Nicholas Hopper,
Yongdae Kim,
Ivan Osipkov:
Provably Secure Timed-Release Public Key Encryption.
ACM Trans. Inf. Syst. Secur. 11(2): (2008) |
2007 |
8 | EE | Nicholas Hopper,
Eugene Y. Vasserman,
Eric Chan-Tin:
How much anonymity does network latency leak?
ACM Conference on Computer and Communications Security 2007: 82-91 |
7 | EE | Eugene Y. Vasserman,
Nicholas Hopper,
John Laxson,
James Tyra:
SilentKnock: Practical, Provably Undetectable Authentication.
ESORICS 2007: 122-138 |
6 | EE | Ivan Osipkov,
Eugene Y. Vasserman,
Nicholas Hopper,
Yongdae Kim:
Combating Double-Spending Using Cooperative P2P Systems.
ICDCS 2007: 41 |
5 | EE | Nicholas Hopper,
David Molnar,
David Wagner:
From Weak to Strong Watermarking.
TCC 2007: 362-382 |
2006 |
4 | EE | Jung Hee Cheon,
Nicholas Hopper,
Yongdae Kim,
Ivan Osipkov:
Timed-Release and Key-Insulated Public Key Encryption.
Financial Cryptography 2006: 191-205 |
3 | EE | Ivan Osipkov,
Peng Wang,
Nicholas Hopper:
Robust Accounting in Decentralized P2P Storage Systems.
ICDCS 2006: 14 |
2 | EE | Nicholas Hopper,
Eugene Y. Vasserman:
On the effectiveness of k;-anonymity against traffic analysis and surveillance.
WPES 2006: 9-18 |
2005 |
1 | EE | Nicholas Hopper:
On Steganographic Chosen Covertext Security.
ICALP 2005: 311-323 |