Παρακολούθηση
Rob Jansen
Rob Jansen
Computer Security Research Scientist, U.S. Naval Research Laboratory
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα nrl.navy.mil - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Users get routed: Traffic correlation on Tor by realistic adversaries
A Johnson, C Wacek, R Jansen, M Sherr, P Syverson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3672013
Shadow: Running Tor in a box for accurate and efficient experimentation
R Jansen, N Hopper
Proceedings of the 19th Symposium on Network and Distributed System Security, 2012
2122012
The sniper attack: Anonymously deanonymizing and disabling the Tor network
R Jansen, F Tschorsch, A Johnson, B Scheuermann
Proceedings of the 21st Symposium on Network and Distributed System Security, 2014
1572014
Recruiting new Tor relays with BRAIDS
R Jansen, N Hopper, Y Kim
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1062010
Inside Job: Applying Traffic Analysis to Measure Tor from Within
R Jansen, M Juarez, R Gálvez, T Elahi, C Diaz
25th Symposium on Network and Distributed System Security, 2018
942018
Safely Measuring Tor
R Jansen, A Johnson
Proceedings of the 23rd ACM Conference on Computer and Communications …, 2016
942016
A TorPath to TorCoin: proof-of-bandwidth altcoins for compensating relays
M Ghosh, M Richardson, B Ford, R Jansen
Workshop on Hot Topics in Privacy Enhancing Technologies, 2014
902014
Understanding tor usage with privacy-preserving measurement
A Mani, T Wilson-Brown, R Jansen, A Johnson, M Sherr
Proceedings of the Internet Measurement Conference 2018, 175-187, 2018
872018
Methodically Modeling the Tor Network.
R Jansen, KS Bauer, N Hopper, R Dingledine
CSET, 2012
862012
Membership-concealing overlay networks
E Vasserman, R Jansen, J Tyra, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications …, 2009
832009
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
A Miller, R Jansen
8th Workshop on Cyber Security Experimentation and Test, 2015
692015
Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
R Jansen, J Geddes, C Wacek, M Sherr, P Syverson
USENIX Security, 2014
602014
Throttling Tor Bandwidth Parasites
R Jansen, P Syverson, N Hopper
21st USENIX Security Symposium, 349-363, 2012
582012
LIRA: Lightweight Incentivized Routing for Anonymity
R Jansen, A Johnson, P Syverson
Proceedings of the 20th Network and Distributed System Security Symposium., 2013
562013
Point break: A study of bandwidth {Denial-of-Service} attacks against tor
R Jansen, T Vaidya, M Sherr
28th USENIX security symposium (USENIX Security 19), 1823-1840, 2019
502019
PeerFlow: Secure load balancing in Tor
A Johnson, R Jansen, N Hopper, A Segal, P Syverson
Proceedings on Privacy Enhancing Technologies, 2017
482017
How low can you go: Balancing performance with anonymity in Tor
J Geddes, R Jansen, N Hopper
International Symposium on Privacy Enhancing Technologies Symposium, 164-184, 2013
462013
Online website fingerprinting: Evaluating website fingerprinting attacks on tor in the real world
G Cherubin, R Jansen, C Troncoso
31st USENIX Security Symposium (USENIX Security 22), 753-770, 2022
412022
Toward anonymity in delay tolerant networks: Threshold pivot scheme
R Jansen, R Beverly
2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 587-592, 2010
382010
IMUX: Managing tor connections from two to infinity, and beyond
J Geddes, R Jansen, N Hopper
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 181-190, 2014
322014
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20