If you made any changes in Pure, your changes will be visible here soon.

Fingerprint The Fingerprint is created by mining the titles and abstracts of the person's research outputs and projects/funding awards to create an index of weighted terms from discipline-specific thesauri.

Steganography Engineering & Materials Science
Authentication Engineering & Materials Science
Anonymity Mathematics
Internet Engineering & Materials Science
Network protocols Engineering & Materials Science
Cryptography Engineering & Materials Science
Routers Engineering & Materials Science
Networks (circuits) Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2006 2021

Research Output 1999 2018

1 Citation (Scopus)

Measuring information leakage in website fingerprinting attacks and defenses

Li, S., Guo, H. & Hopper, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1977-1992 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites

MP3: A More Efficient Private Presence Protocol

Parhi, R., Schliep, M. & Hopper, N., Jan 1 2018, Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Revised Selected Papers. Meiklejohn, S. & Sako, K. (eds.). Springer- Verlag, p. 38-57 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10957 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalability
Bandwidth
Facings
Costs
Registration

Privacy-preserving dynamic learning of tor network traffic

Jansen, R., Traudt, M. & Hopper, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1944-1961 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hidden Markov models
Statistics
Bandwidth
Experiments

Is bob sending mixed signals?

Schliep, M., Kariniemi, I. & Hopper, N., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 31-40 10 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

vulnerability
Network protocols
integrity
conversation
Servers
2 Citations (Scopus)

ABRA CADABRA: Magically increasing network utilization in tor by avoiding bottlenecks

Geddes, J., Schliep, M. & Hopper, N., Oct 24 2016, WPES 2016 - Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society, co-located with CCS 2016. Association for Computing Machinery, Inc, p. 165-176 12 p. (WPES 2016 - Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society, co-located with CCS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

utilization
anonymity
Networks (circuits)
anarchy
Routing protocols