The SCEAS System
Navigation Menu

Search the dblp DataBase


Nikita Borisov: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nikita Borisov, Monica Chew, Robert Johnson, David Wagner
    Multiplicative Differentials. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:17-33 [Conf]
  2. Nikita Borisov, Ian Goldberg, David Wagner
    Intercepting mobile communications: the insecurity of 802.11. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2001, pp:180-189 [Conf]
  3. Nikita Borisov, Eric A. Brewer
    Active Certificates: A Framework for Delegation. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  4. Qiang Huang, Helen J. Wang, Nikita Borisov
    Privacy-Preserving Friends Troubleshooting Network. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  5. Nikita Borisov
    Computational Puzzles as Sybil Defenses. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2006, pp:171-176 [Conf]
  6. Nikita Borisov
    An Analysis of Parallel Mixing with Attacker-Controlled Inputs. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:12-25 [Conf]
  7. Parisa Tabriz, Nikita Borisov
    Breaking the Collusion Detection Mechanism of MorphMix. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:368-383 [Conf]
  8. J. Robert von Behren, Eric A. Brewer, Nikita Borisov, Michael Chen, Matt Welsh, Josh MacDonald, Jeremy Lau, David E. Culler
    Ninja: A Framework for Network Services. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2002, pp:87-102 [Conf]
  9. Nikita Borisov, Ian Goldberg, Eric A. Brewer
    Off-the-record communication, or, why not to use PGP. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:77-84 [Conf]
  10. Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David E. Culler, Nikita Borisov, Steven E. Czerwinski, Ramakrishna Gummadi, Jon R. Hill, Anthony D. Joseph, Randy H. Katz, Zhuoqing Morley Mao, S. Ross, Ben Y. Zhao
    The Ninja architecture for robust Internet-scale systems and services. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:35, n:4, pp:473-497 [Journal]

  11. Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. [Citation Graph (, )][DBLP]

  12. Denial of service or denial of security? [Citation Graph (, )][DBLP]

  13. Improving multi-tier security using redundant authentication. [Citation Graph (, )][DBLP]

  14. Information leaks in structured peer-to-peer anonymous communication systems. [Citation Graph (, )][DBLP]

  15. Confidentiality-preserving distributed proofs of conjunctive queries. [Citation Graph (, )][DBLP]

  16. ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. [Citation Graph (, )][DBLP]

  17. Deleting index entries from compliance storage. [Citation Graph (, )][DBLP]

  18. Attacking and Repairing the Improved ModOnions Protocol. [Citation Graph (, )][DBLP]

  19. Generic Application-Level Protocol Analyzer and its Language. [Citation Graph (, )][DBLP]

  20. A Tune-up for Tor: Improving Security and Performance in the Tor Network. [Citation Graph (, )][DBLP]

  21. RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. [Citation Graph (, )][DBLP]

  22. High-Speed Matching of Vulnerability Signatures. [Citation Graph (, )][DBLP]

  23. Safety in discretionary access control for logic-based publish-subscribe systems. [Citation Graph (, )][DBLP]

  24. Multi-flow Attacks Against Network Flow Watermarking Schemes. [Citation Graph (, )][DBLP]

  25. FlyByNight: mitigating the privacy risks of social networking. [Citation Graph (, )][DBLP]

  26. Single-bit re-encryption with applications to distributed proof systems. [Citation Graph (, )][DBLP]

  27. Secure aggregation in a publish-subscribe system. [Citation Graph (, )][DBLP]

  28. A privacy-preserving interdomain audit framework. [Citation Graph (, )][DBLP]

  29. flyByNight: mitigating the privacy risks of social networking. [Citation Graph (, )][DBLP]

  30. Multi-flow attack resistant watermarks for network flows. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002