Fingerprint The Fingerprint is created by mining the titles and abstracts of the person's research outputs and projects/funding awards to create an index of weighted terms from discipline-specific thesauri.

Costs Engineering & Materials Science
Internet Engineering & Materials Science
Communication Engineering & Materials Science
Steganography Engineering & Materials Science
Authentication Engineering & Materials Science
Anonymity Mathematics
Cryptography Engineering & Materials Science
Routers Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2006 2017

Research Output 1999 2017

The cost of the path not taken

Schuchard, M., Geddes, J., Schliep, M. & Hopper, N. Feb 2 2017 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7842316

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Costs

ABRA CADABRA: Magically increasing network utilization in tor by avoiding bottlenecks

Geddes, J., Schliep, M. & Hopper, N. Oct 24 2016 WPES 2016 - Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society, co-located with CCS 2016. Association for Computing Machinery, Inc, p. 165-176 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

network
algorithm
utilization
client
selection
1 Citations

Hijacking the Vuze BitTorrent network: All your hop are belong to us

Chan-Tin, E., Heorhiadi, V., Hopper, N. & Kim, Y. Jul 1 2015 In : IET Information Security. 9, 4, p. 203-208 6 p.

Research output: Contribution to journalArticle

Costs
Experiments

WPES '15 foreword

Hopper, N. & Jansen, R. Oct 12 2015 In : Unknown Journal. p. iii

Research output: Contribution to journalArticle

WPES 2015: The 14th Workshop on Privacy in the Electronic Society

Hopper, N. & Jansen, R. Oct 12 2015 Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October, p. 1719-1720 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Data reduction
Communication
Secure communication