Cheriton

Results: 188



#Item
91

Poster: Practical Website Fingerprinting on Tor Tao Wang PhD Candidate Cheriton School of Computer Science University of Waterloo

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-05-07 16:20:34
    92

    2011 IEEE Symposium on Security and Privacy Extending Nymble-like Systems Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2011-04-10 18:07:16
      93

      2011 IEEE Symposium on Security and Privacy Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2011-04-10 18:06:50
        94Video cards / Mathematics / GPGPU / Graphics hardware / Logarithms / CUDA / Parallel Thread Execution / Graphics processing unit / Nvidia Tesla / Abstract algebra / Nvidia / Computer hardware

        Solving Discrete Logarithms in Smooth-Order Groups with CUDA1 Ryan Henry Ian Goldberg Cheriton School of Computer Science

        Add to Reading List

        Source URL: www.cypherpunks.ca

        Language: English - Date: 2012-03-10 18:19:21
        95Internet privacy / Cryptographic software / Anonymity / Anonymous remailer / Proxy servers / Email / Penet remailer / Pseudonymous remailer / Pseudonymity / Cryptography / Internet / Computing

        Privacy Enhancing Technologies for the Internet III: Ten Years Later∗ Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo Waterloo, ON

        Add to Reading List

        Source URL: www.cypherpunks.ca

        Language: English - Date: 2007-12-29 13:05:17
        96Computing / Internet / Teletraffic / Network congestion / Onion routing / Routing / Tor / Transmission Control Protocol / Network performance / Internet privacy / Network architecture

        Congestion-aware Path Selection for Tor⋆ Tao Wang, Kevin Bauer, Clara Forero, and Ian Goldberg Cheriton School of Computer Science University of Waterloo {t55wang,k4bauer,ciforero,iang}@cs.uwaterloo.ca

        Add to Reading List

        Source URL: www.cypherpunks.ca

        Language: English - Date: 2011-12-30 18:18:27
        97Anonymity / Public-key cryptography / Group signature / Security token / Internet privacy / User / Blacklist / Trusted Computing / Digital credential / Cryptography / Privacy-enhancing technologies / Pseudonymity

        Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

        Add to Reading List

        Source URL: www.cypherpunks.ca

        Language: English - Date: 2011-03-09 14:36:12
        98Zero-knowledge proof / IP / Soundness / Commitment scheme / NP / Interactive proof system / Non-interactive zero-knowledge proof / Cryptography / Cryptographic protocols / Proof of knowledge

        Batch Proofs of Partial Knowledge Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

        Add to Reading List

        Source URL: cacr.uwaterloo.ca

        Language: English - Date: 2013-02-12 09:54:17
        99Internet / Internet privacy / Streaming / Teletraffic / File sharing networks / Tor / Onion routing / Throughput / Proxy server / Computing / Network performance / Network architecture

        The Path Less Travelled: Overcoming Tor’s Bottlenecks with Traffic Splitting∗ Mashael AlSabah, Kevin Bauer, Tariq Elahi, and Ian Goldberg {malsabah,k4bauer,mtelahi,iang}@cs.uwaterloo.ca Cheriton School of Computer Sc

        Add to Reading List

        Source URL: www.cypherpunks.ca

        Language: English - Date: 2013-05-03 09:23:34
        100Alice and Bob / Replay attack / Man-in-the-middle attack / Cryptographic hash function / RSA / Communications protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols

        On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

        Add to Reading List

        Source URL: www.cypherpunks.ca

        Language: English - Date: 2009-11-13 20:20:01
        UPDATE