|
Search the dblp DataBase
Nikita Borisov:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Nikita Borisov, Monica Chew, Robert Johnson, David Wagner
Multiplicative Differentials. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:17-33 [Conf]
- Nikita Borisov, Ian Goldberg, David Wagner
Intercepting mobile communications: the insecurity of 802.11. [Citation Graph (0, 0)][DBLP] MOBICOM, 2001, pp:180-189 [Conf]
- Nikita Borisov, Eric A. Brewer
Active Certificates: A Framework for Delegation. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Qiang Huang, Helen J. Wang, Nikita Borisov
Privacy-Preserving Friends Troubleshooting Network. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Nikita Borisov
Computational Puzzles as Sybil Defenses. [Citation Graph (0, 0)][DBLP] Peer-to-Peer Computing, 2006, pp:171-176 [Conf]
- Nikita Borisov
An Analysis of Parallel Mixing with Attacker-Controlled Inputs. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2005, pp:12-25 [Conf]
- Parisa Tabriz, Nikita Borisov
Breaking the Collusion Detection Mechanism of MorphMix. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2006, pp:368-383 [Conf]
- J. Robert von Behren, Eric A. Brewer, Nikita Borisov, Michael Chen, Matt Welsh, Josh MacDonald, Jeremy Lau, David E. Culler
Ninja: A Framework for Network Services. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2002, pp:87-102 [Conf]
- Nikita Borisov, Ian Goldberg, Eric A. Brewer
Off-the-record communication, or, why not to use PGP. [Citation Graph (0, 0)][DBLP] WPES, 2004, pp:77-84 [Conf]
- Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David E. Culler, Nikita Borisov, Steven E. Czerwinski, Ramakrishna Gummadi, Jon R. Hill, Anthony D. Joseph, Randy H. Katz, Zhuoqing Morley Mao, S. Ross, Ben Y. Zhao
The Ninja architecture for robust Internet-scale systems and services. [Citation Graph (0, 0)][DBLP] Computer Networks, 2001, v:35, n:4, pp:473-497 [Journal]
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. [Citation Graph (, )][DBLP]
Denial of service or denial of security? [Citation Graph (, )][DBLP]
Improving multi-tier security using redundant authentication. [Citation Graph (, )][DBLP]
Information leaks in structured peer-to-peer anonymous communication systems. [Citation Graph (, )][DBLP]
Confidentiality-preserving distributed proofs of conjunctive queries. [Citation Graph (, )][DBLP]
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. [Citation Graph (, )][DBLP]
Deleting index entries from compliance storage. [Citation Graph (, )][DBLP]
Attacking and Repairing the Improved ModOnions Protocol. [Citation Graph (, )][DBLP]
Generic Application-Level Protocol Analyzer and its Language. [Citation Graph (, )][DBLP]
A Tune-up for Tor: Improving Security and Performance in the Tor Network. [Citation Graph (, )][DBLP]
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. [Citation Graph (, )][DBLP]
High-Speed Matching of Vulnerability Signatures. [Citation Graph (, )][DBLP]
Safety in discretionary access control for logic-based publish-subscribe systems. [Citation Graph (, )][DBLP]
Multi-flow Attacks Against Network Flow Watermarking Schemes. [Citation Graph (, )][DBLP]
FlyByNight: mitigating the privacy risks of social networking. [Citation Graph (, )][DBLP]
Single-bit re-encryption with applications to distributed proof systems. [Citation Graph (, )][DBLP]
Secure aggregation in a publish-subscribe system. [Citation Graph (, )][DBLP]
A privacy-preserving interdomain audit framework. [Citation Graph (, )][DBLP]
flyByNight: mitigating the privacy risks of social networking. [Citation Graph (, )][DBLP]
Multi-flow attack resistant watermarks for network flows. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|