NRL

Results: 821



#Item
21Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication Paul Syverson Griffin Boyce

Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication Paul Syverson Griffin Boyce

Add to Reading List

Source URL: www.nrl.navy.mil

- Date: 2015-04-14 14:13:35
    22Dissent in Numbers: Making Strong Anonymity Scale David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University Aaron Johnson U.S. Naval Research Laboratory

    Dissent in Numbers: Making Strong Anonymity Scale David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University Aaron Johnson U.S. Naval Research Laboratory

    Add to Reading List

    Source URL: www.nrl.navy.mil

    - Date: 2013-04-25 12:14:47
      23The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

      The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

      Add to Reading List

      Source URL: www.nrl.navy.mil

      - Date: 2013-12-23 14:15:36
        24txt Printed: Dec 16 4:39:54 PM Page 1 of 8 Printed07For: Kate Green

        txt Printed: Dec 16 4:39:54 PM Page 1 of 8 Printed07For: Kate Green

        Add to Reading List

        Source URL: www.nrl.navy.mil

        - Date: 2013-04-25 13:00:17
          25Shadow: Running Tor in a Box for Accurate and Efficient Experimentation

          Shadow: Running Tor in a Box for Accurate and Efficient Experimentation

          Add to Reading List

          Source URL: www.nrl.navy.mil

          - Date: 2013-05-28 10:00:45
            26Naval Research Laboratory Washington, DCNRL/MRDistributed Logics

            Naval Research Laboratory Washington, DCNRL/MRDistributed Logics

            Add to Reading List

            Source URL: www.nrl.navy.mil

            - Date: 2014-11-12 13:37:43
              27Tor’s Been KIST: A Case Study of Transitioning Tor Research to Practice Rob Jansen and Matthew Traudt U.S. Naval Research Laboratory {rob.g.jansen, matthew.traudt}@nrl.navy.mil Abstract

              Tor’s Been KIST: A Case Study of Transitioning Tor Research to Practice Rob Jansen and Matthew Traudt U.S. Naval Research Laboratory {rob.g.jansen, matthew.traudt}@nrl.navy.mil Abstract

              Add to Reading List

              Source URL: www.robgjansen.com

              - Date: 2018-02-21 17:29:46
                28Simulation Logic William L. Harrison Dept. of Computer Science University of Missouri Columbia, Missouri, U.S.A.

                Simulation Logic William L. Harrison Dept. of Computer Science University of Missouri Columbia, Missouri, U.S.A.

                Add to Reading List

                Source URL: www.nrl.navy.mil

                - Date: 2013-07-02 16:22:06
                  29XenonCommonalityAnalysisV12

                  XenonCommonalityAnalysisV12

                  Add to Reading List

                  Source URL: www.nrl.navy.mil

                  - Date: 2017-07-20 17:11:31
                    30Representing Network Trust and Using It to Improve Anonymous Communication? Aaron D. Jaggard1 , Aaron Johnson1 , Paul Syverson1 , and Joan Feigenbaum2 1  U.S. Naval Research Laboratory

                    Representing Network Trust and Using It to Improve Anonymous Communication? Aaron D. Jaggard1 , Aaron Johnson1 , Paul Syverson1 , and Joan Feigenbaum2 1 U.S. Naval Research Laboratory

                    Add to Reading List

                    Source URL: www.nrl.navy.mil

                    - Date: 2014-06-25 11:30:47