Παρακολούθηση
Nicholas Hopper
Nicholas Hopper
Professor of Computer Science & Engineering, University of Minnesota
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα umn.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
CAPTCHA: Using hard AI problems for security
LV Ahn, M Blum, NJ Hopper, J Langford
Proceedings of the 22nd international conference on Theory and applications …, 2003
23442003
Secure human identification protocols
NJ Hopper, M Blum
Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001
7512001
Provably secure steganography
N Hopper, L von Ahn, J Langford
IEEE Transactions on Computers, 662-676, 2008
344*2008
How much anonymity does network latency leak?
N Hopper, EY Vasserman, E Chan-Tin
ACM Transactions on Information and System Security (TISSEC) 13 (2), 13, 2010
3312010
Vampire attacks: Draining life from wireless ad hoc sensor networks
EY Vasserman, N Hopper
IEEE transactions on mobile computing 12 (2), 318-332, 2011
2722011
Shadow: Running Tor in a box for accurate and efficient experimentation
R Jansen, NJ Hopper
2312011
Public-key steganography
L Von Ahn, NJ Hopper
International Conference on the Theory and Applications of Cryptographic …, 2004
2162004
Analysis of genetic diversity through population history
NF McPhee, NJ Hopper
Proceedings of the genetic and evolutionary computation conference 2, 1112-1120, 1999
1851999
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Okada, I Satoh
Lecture notes in computer science (including subseries lecture notes in …, 2007
179*2007
Losing control of the internet: using the data plane to attack the control plane
M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1602010
Keep your friends close: Incorporating trust into social network-based sybil defenses
A Mohaisen, N Hopper, Y Kim
2011 Proceedings IEEE INFOCOM, 1943-1951, 2011
1562011
Scalable onion routing with torsk
J McLachlan, A Tran, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1502009
Location leaks on the GSM air interface
DF Kune, J Koelndorfer, N Hopper, Y Kim
ISOC NDSS (Feb 2012), 2012
1392012
The captcha project (completely automatic public turing test to tell computers and humans apart)
M Blum, LA Von Ahn, J Langford, N Hopper
School of Computer Science, Carnegie-Mellon University, http://www. captcha. net, 2000
1292000
Measuring information leakage in website fingerprinting attacks and defenses
S Li, H Guo, N Hopper
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1202018
Recruiting new Tor relays with BRAIDS
R Jansen, N Hopper, Y Kim
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1142010
Routing around decoys
M Schuchard, J Geddes, C Thompson, N Hopper
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1122012
Cover your ACKs: Pitfalls of covert channel censorship circumvention
J Geddes, M Schuchard, N Hopper
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1092013
A secure human-computer authentication scheme
NJ Hopper, M Blum
School of Computer Science, Carnegie Mellon University, 2000
1032000
The frog-boiling attack: Limitations of secure network coordinate systems
E Chan-Tin, V Heorhiadi, N Hopper, Y Kim
ACM Transactions on information and system security (TISSEC) 14 (3), 1-23, 2011
102*2011
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20