Borisov

Results: 135



#Item
1Cryptography / Public-key cryptography / Transport Layer Security / Cross-platform software / Internet protocols / Cryptographic protocols / Private information retrieval / XMPP / Forward secrecy / HTTPS / Email / WHOIS

Proceedings on Privacy Enhancing Technologies 2015; ):4–24 Nikita Borisov*, George Danezis*, and Ian Goldberg* DP5: A Private Presence Service Abstract: Users of social applications like to be notified

Add to Reading List

Source URL: www.degruyter.com

Language: English
2

TightRope: Towards Optimal Load-balancing of Paths in Anonymous Networks Hussein Darir, Hussein Sibai, Nikita Borisov, Geir Dullerud, Sayan Mitra Coordinated Science Laboratory University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: mitras.ece.illinois.edu

Language: English - Date: 2018-09-20 18:40:08
    3

    Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign, Carmela Troncoso, Alfredo Rial†

    Add to Reading List

    Source URL: carmelatroncoso.com

    Language: English - Date: 2015-11-19 22:20:42
      4Cryptography / Cryptographic protocols / Public key infrastructure / Public-key cryptography / CodeCon / King / Alice and Bob / Internet privacy

      Off-the-Record Communication, or, Why Not to Use PGP Nikita Borisov Ian Goldberg

      Add to Reading List

      Source URL: otr.cypherpunks.ca

      Language: English - Date: 2013-09-28 15:30:06
      5

      Proceedings on Privacy Enhancing Technologies 2015; ):4–24 Nikita Borisov*, George Danezis*, and Ian Goldberg* DP5: A Private Presence Service Abstract: Users of social applications like to be notified

      Add to Reading List

      Source URL: www.petsymposium.org

      Language: English - Date: 2015-06-23 15:36:19
        6

        The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

        Add to Reading List

        Source URL: www.jbonneau.com

        Language: English - Date: 2018-05-15 14:47:19
          7Computing / Internet / Secure communication / Information and communications technology / Internet architecture / Internet privacy / Internet Standards / Internet protocols / Mix network / Tor / Computer network / Distributed hash table

          Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity Nikita Borisov George Danezis

          Add to Reading List

          Source URL: www0.cs.ucl.ac.uk

          Language: English - Date: 2013-10-10 06:48:53
          8

          Proceedings on Privacy Enhancing Technologies 2015; ):1–17 Joshua Juen*, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar Defending Tor from Network Adversaries: A Case Study of Network Path Predic

          Add to Reading List

          Source URL: www.nrl.navy.mil

          - Date: 2015-05-18 10:21:01
            9

            A Context-aware Time Model for Web Search Alexey Borisov†, ‡ Ilya Markov‡ Maarten de Rijke‡ Pavel Serdyukov†

            Add to Reading List

            Source URL: staff.fnwi.uva.nl

            - Date: 2016-05-12 03:34:14
              UPDATE