USENIX

Results: 1311



#Item
31Computing / Internet / Internet security / Secure communication / Free software / Transmission Control Protocol / Tor / Support vector machine

Effective Attacks and Provable Defenses for Website Fingerprinting Tao Wang, University of Waterloo; Xiang Cai, Rishab Nithyanand, and Rob Johnson, Stony Brook University; Ian Goldberg, University of Waterloo https://www

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-20 08:19:38
32Computing / Software / Video game publishers / Economy of China / Entertainment Software Association / Online marketplaces / E-commerce / ITunes / App Store / Google Play / WeChat / Nintendo

Measuring Decentralization of Chinese Keyword Censorship via Mobile Games Jeffrey Knockel1,2 , Lotus Ruan1 , and Masashi Crete-Nishihata1 1 Citizen Lab, Munk School of Global Affairs, University of Toronto

Add to Reading List

Source URL: www.usenix.org

Language: English
33Computing / Free software / Concurrent computing / Apache Hadoop / Apache Software Foundation / Cloud infrastructure / Coding theory / RAID / Computer data storage / Erasure code / Google File System / Disk formatting

A Tale of Two Erasure Codes in HDFS Mingyuan Xia, McGill University; Mohit Saxena, Mario Blaum, and David A. Pease, IBM Research Almaden https://www.usenix.org/conference/fast15/technical-sessions/presentation/xia This

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-20 22:28:51
34Computing / Internet / Anonymity / Cryptography / Internet privacy / Dining cryptographers problem / Internet Standards / Internet Relay Chat / Clientserver model / Anonymous web browsing / Server / Anonymizer

Dissent in Numbers: Making Strong Anonymity Scale David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University Aaron Johnson U.S. Naval Research Laboratory

Add to Reading List

Source URL: www.usenix.org

Language: English
35Women's Islamic Games

Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’16) Errata Slip In the paper “Be Fast, Cheap and in Control with SwitchKV” by Xiaozhou Li and Raghav Sethi, Princeton

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2017-07-14 07:19:47
    36Cryptography / Public-key cryptography / Computational complexity theory / Zero-knowledge proof / Proof of knowledge / Commitment scheme / Non-interactive zero-knowledge proof / IP / Cryptographic protocol / NP / RSA / Zero knowledge

    ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash Sarah Meiklejohn University of California, San Diego smeiklej@ cs.ucsd.edu

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2010-06-18 19:02:40
    37Synchronization / Clock synchronization / Clocks / Granularity / Fairness measure / Clock signal

    Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’18) Errata Slip In the paper “Exploiting a Natural Network Effect for Scalable, Fine-grained Clock Synchronization” by

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2018-04-09 11:33:55
    38Botnets / Cybercrime / Computing / Cyberwarfare / Denial-of-service attacks / Linux malware / Computer network security / Mirai / BASHLITE / Internet of things / TR-069 / Denial-of-service attack

    usenix_logo_full_color_tm

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
    39

    PDF Document

    Add to Reading List

    Source URL: www.usenix.org

    - Date: 2016-06-01 03:51:08
      40

      PDF Document

      Add to Reading List

      Source URL: www.usenix.org

      - Date: 2016-02-19 14:53:09
        UPDATE