If you made any changes in Pure, your changes will be visible here soon.

Fingerprint The Fingerprint is created by mining the titles and abstracts of the person's research outputs and projects/funding awards to create an index of weighted terms from discipline-specific thesauri.

Steganography Engineering & Materials Science
Authentication Engineering & Materials Science
Anonymity Mathematics
Internet Engineering & Materials Science
Network protocols Engineering & Materials Science
Cryptography Engineering & Materials Science
Routers Engineering & Materials Science
Networks (circuits) Engineering & Materials Science

Projects 2006 2021

Research Output 2006 2010

  • 2 Conference contribution
  • 1 Article
63 Citations (Scopus)

How much anonymity does network latency leak?

Hopper, N., Vasserman, E. Y. & Chan-Tin, E., Feb 1 2010, In : ACM Transactions on Information and System Security. 13, 2, 13.

Research output: Contribution to journalArticle

Networks (circuits)
12 Citations (Scopus)

Combating double-spending using cooperative P2P systems

Osipkov, I., Vasserman, E. Y., Hopper, N. & Yongdae, K., Oct 8 2007, 27th International Conference on Distributed Computing Systems, ICDCS'07. 4268195. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic money

Timed-release and key-insulated public key encryption

Cheon, J. H., Hopper, N., Kim, Y. & Osipkov, I., Jan 1 2006, Financial Cryptography and Data Security - 10th International Conference, FC 2006, Revised Selected Papers. Springer- Verlag, p. 191-205 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4107 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public Key Encryption
Public Key Cryptography
Identity-based Encryption
Random Access