Följ
Aaron Johnson
Aaron Johnson
Verifierad e-postadress på nrl.navy.mil - Startsida
Titel
Citeras av
Citeras av
År
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
A Johnson, C Wacek, R Jansen, M Sherr, P Syverson
3672013
Dissent in numbers: making strong anonymity scale
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
Proceedings of the 10th USENIX conference on Operating Systems Design and …, 2012
2622012
Privacy-preserving data exploration in genome-wide association studies
A Johnson, V Shmatikov
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
2472013
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network
R Jansen, F Tschorsch, A Johnson, B Scheuermann
Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, USA, 2014
1572014
Probabilistic analysis of onion routing in a black-box model
J Feigenbaum, A Johnson, P Syverson
ACM Transactions on Information and System Security (TISSEC) 15 (3), 1-28, 2012
1552012
Probabilistic analysis of onion routing in a black-box model
J Feigenbaum, A Johnson, P Syverson
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 1-10, 2007
155*2007
A model of onion routing with provable anonymity
J Feigenbaum, A Johnson, P Syverson
International Conference on Financial Cryptography and Data Security, 57-71, 2007
1322007
Safely Measuring Tor
R Jansen, A Johnson
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
942016
Understanding tor usage with privacy-preserving measurement
A Mani, T Wilson-Brown, R Jansen, A Johnson, M Sherr
Proceedings of the Internet Measurement Conference 2018, 175-187, 2018
872018
Private web search
F Saint-Jean, A Johnson, D Boneh, J Feigenbaum
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 84-90, 2007
862007
Trust-based anonymous communication: adversary models and routing algorithms
AM Johnson, P Syverson, R Dingledine, N Mathewson
Proceedings of the 18th ACM conference on Computer and communications …, 2011
612011
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction.
J Juen, A Johnson, A Das, N Borisov, M Caesar
PoPETs 2015 (2), 171-187, 2015
602015
LIRA: Lightweight Incentivized Routing for Anonymity
R Jansen, A Johnson, P Syverson
the 20th Network and Distributed System Security Symposium.(February 2013), 2013
562013
Scalable anonymous group communication in the anytrust model
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
European Workshop on System Security (EuroSec) 4, 2012
532012
PeerFlow: Secure Load Balancing in Tor
A Johnson, R Jansen, N Hopper, A Segal, P Syverson
Proceedings on Privacy Enhancing Technologies 2017 (2), 74-94, 2017
482017
Preventing active timing attacks in low-latency anonymous communication
J Feigenbaum, A Johnson, P Syverson
Privacy Enhancing Technologies, 166-183, 2010
43*2010
More anonymous onion routing through trust
A Johnson, P Syverson
Computer Security Foundations Symposium, 2009. CSF'09. 22nd IEEE, 3-12, 2009
392009
Security analysis of accountable anonymous group communication in Dissent
E Syta, A Johnson, H Corrigan-Gibbs, SC Weng, D Wolinsky, B Ford
YALE UNIV NEW HAVEN CT DEPT OF COMPUTER SCIENCE, 2013
33*2013
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection
A Johnson, R Jansen, AD Jaggard, J Feigenbaum, P Syverson
24th Network and Distributed System Security Symposium (NDSS 2017), 2017
302017
Security analysis of accountable anonymity in Dissent
E Syta, H Corrigan-Gibbs, SC Weng, D Wolinsky, B Ford, A Johnson
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-35, 2014
302014
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20