|
Search the dblp DataBase
Nicholas Hopper:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
Timed-Release and Key-Insulated Public Key Encryption. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2006, pp:191-205 [Conf]
- Nicholas Hopper
On Steganographic Chosen Covertext Security. [Citation Graph (0, 0)][DBLP] ICALP, 2005, pp:311-323 [Conf]
- Ivan Osipkov, Peng Wang, Nicholas Hopper
Robust Accounting in Decentralized P2P Storage Systems. [Citation Graph (0, 0)][DBLP] ICDCS, 2006, pp:14- [Conf]
- Nicholas Hopper, David Molnar, David Wagner
From Weak to Strong Watermarking. [Citation Graph (0, 0)][DBLP] TCC, 2007, pp:362-382 [Conf]
- Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra
SilentKnock: Practical, Provably Undetectable Authentication. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:122-138 [Conf]
- Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper, Yongdae Kim
Combating Double-Spending Using Cooperative P2P Systems. [Citation Graph (0, 0)][DBLP] ICDCS, 2007, pp:41- [Conf]
How much anonymity does network latency leak? [Citation Graph (, )][DBLP]
Membership-concealing overlay networks. [Citation Graph (, )][DBLP]
Towards complete node enumeration in a peer-to-peer botnet. [Citation Graph (, )][DBLP]
Scalable onion routing with torsk. [Citation Graph (, )][DBLP]
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes. [Citation Graph (, )][DBLP]
Why Kad Lookup Fails. [Citation Graph (, )][DBLP]
On the effectiveness of k;-anonymity against traffic analysis and surveillance. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|