Fingerprint The Fingerprint is created by mining the titles and abstracts of the person's research outputs and projects/funding awards to create an index of weighted terms from discipline-specific thesauri.

  • 10 Similar Profiles
Communication Engineering & Materials Science
Internet Engineering & Materials Science
Steganography Engineering & Materials Science
Costs Engineering & Materials Science
Cryptography Engineering & Materials Science
Routers Engineering & Materials Science
Experiments Engineering & Materials Science
Overlay networks Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2006 2017

Research Output 1999 2015

1 Citations

Hijacking the Vuze BitTorrent network: All your hop are belong to us

Chan-Tin, E., Heorhiadi, V., Hopper, N. & Kim, Y. Jul 1 2015 In : IET Information Security. 9, 4, p. 203-208 6 p.

Research output: Contribution to journalArticle

Costs
Experiments

WPES '15 foreword

Hopper, N. & Jansen, R. Oct 12 2015 In : Unknown Journal. p. iii

Research output: Contribution to journalArticle

WPES 2015: The 14th Workshop on Privacy in the Electronic Society

Hopper, N. & Jansen, R. Oct 12 2015 Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October, p. 1719-1720 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Data reduction
Communication
Secure communication

Challenges in protecting tor hidden services from botnet abuse

Hopper, N. 2014 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8437, p. 316-325 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8437)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers

Facet: Streaming over videoconferencing for censorship circumvention

Li, S., Schliep, M. & Hopper, N. Nov 3 2014 Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 163-172 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Internet