Fingerprint The Fingerprint is created by mining the titles and abstracts of the person's research outputs and projects/funding awards to create an index of weighted terms from discipline-specific thesauri.

Steganography Engineering & Materials Science
Cryptography Engineering & Materials Science
Authentication Engineering & Materials Science
Anonymity Mathematics
Internet Engineering & Materials Science
Network protocols Engineering & Materials Science
Routers Engineering & Materials Science
Networks (circuits) Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2006 2018

Research Output 1999 2017

Is bob sending mixed signals?

Schliep, M., Kariniemi, I. & Hopper, N. Oct 30 2017 WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, Vol. 2017-January, p. 31-40 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

vulnerability
Network protocols
integrity
conversation
Servers

ABRA CADABRA: Magically increasing network utilization in tor by avoiding bottlenecks

Geddes, J., Schliep, M. & Hopper, N. Oct 24 2016 WPES 2016 - Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society, co-located with CCS 2016. Association for Computing Machinery, Inc, p. 165-176 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

utilization
anonymity
Networks (circuits)
anarchy
Routing protocols

The cost of the path not taken

Schuchard, M., Geddes, J., Schliep, M. & Hopper, N. Jan 1 2016 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7842316

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Costs
1 Citations

Hijacking the Vuze BitTorrent network: All your hop are belong to us

Chan-Tin, E., Heorhiadi, V., Hopper, N. & Kim, Y. Jan 1 2015 In : IET Information Security. 9, 4, p. 203-208 6 p.

Research output: Contribution to journalArticle

Costs
Experiments