NRL

Results: 821



#Item
11Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

Add to Reading List

Source URL: www.nrl.navy.mil

- Date: 2013-04-25 12:21:06
    12Trust-based Anonymous Communication: Adversary Models and Routing Algorithms ∗ Aaron Johnson

    Trust-based Anonymous Communication: Adversary Models and Routing Algorithms ∗ Aaron Johnson

    Add to Reading List

    Source URL: www.nrl.navy.mil

    - Date: 2013-04-25 12:23:44
      13From Onions to Shallots: Rewarding Tor Relays with TEARS Rob Jansen1 , Andrew Miller2 , Paul Syverson1 , and Bryan Ford3 1  U.S. Naval Research Laboratory, Washington, DC

      From Onions to Shallots: Rewarding Tor Relays with TEARS Rob Jansen1 , Andrew Miller2 , Paul Syverson1 , and Bryan Ford3 1 U.S. Naval Research Laboratory, Washington, DC

      Add to Reading List

      Source URL: www.nrl.navy.mil

      - Date: 2014-06-02 12:46:14
        14Proceedings on Privacy Enhancing Technologies 2015; ):1–17  Joshua Juen*, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar Defending Tor from Network Adversaries: A Case Study of Network Path Predic

        Proceedings on Privacy Enhancing Technologies 2015; ):1–17 Joshua Juen*, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar Defending Tor from Network Adversaries: A Case Study of Network Path Predic

        Add to Reading List

        Source URL: www.nrl.navy.mil

        - Date: 2015-05-18 10:21:01
          15Methodically Modeling the Tor Network

          Methodically Modeling the Tor Network

          Add to Reading List

          Source URL: www.nrl.navy.mil

          - Date: 2013-05-28 09:57:58
            16IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† †  Rob Jansen‡

            IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

            Add to Reading List

            Source URL: www.nrl.navy.mil

            - Date: 2014-09-25 10:12:41
              17Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport Rob Jansen† Chris Wacek∗

              Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport Rob Jansen† Chris Wacek∗

              Add to Reading List

              Source URL: www.nrl.navy.mil

              - Date: 2014-07-17 10:05:20
                18Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries

                Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries

                Add to Reading List

                Source URL: www.nrl.navy.mil

                - Date: 2013-09-03 12:19:27
                  19Yale University Department of Computer Science Security Analysis of Accountable Anonymous Group Communication in Dissent Ewa Syta Aaron Johnson

                  Yale University Department of Computer Science Security Analysis of Accountable Anonymous Group Communication in Dissent Ewa Syta Aaron Johnson

                  Add to Reading List

                  Source URL: www.nrl.navy.mil

                  - Date: 2013-05-28 10:05:55
                    20Hidden-service statistics reported by relays David Goulet The Tor Project   Aaron Johnson

                    Hidden-service statistics reported by relays David Goulet The Tor Project Aaron Johnson

                    Add to Reading List

                    Source URL: www.nrl.navy.mil

                    - Date: 2015-06-17 14:54:38