Aaron Johnson

Results: 89



#Item
31

Defending Tor from Network Adversaries: A Case Study of Network Path Prediction Joshua Juen Aaron Johnson

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-03-04 20:16:26
    32

    Proceedings on Privacy Enhancing Technologies 2015; ):171–187 Joshua Juen*, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar Defending Tor from Network Adversaries: A Case Study of Network Path Pre

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2015-06-30 14:26:57
      33Computing / Internet / Cryptography / Internet privacy / Onion routing / Routing / Tor / Universal composability / Anonymity / Proxy server / IP / Posterior probability

      A Probabilistic Analysis of Onion Routing in a Black-box Model JOAN FEIGENBAUM, Yale University AARON JOHNSON, U.S. Naval Research Laboratory PAUL SYVERSON, U.S. Naval Research Laboratory

      Add to Reading List

      Source URL: ohmygodel.com

      Language: English - Date: 2012-07-09 20:58:21
      34Biology / Genetics / Population genetics / Biological databases / Molecular biology / Mutation / Single-nucleotide polymorphism / Genome-wide association study / Exponential mechanism / International HapMap Project / Linkage disequilibrium / Tag SNP

      Privacy-Preserving Data Exploration in Genome-Wide Association Studies ∗ Aaron Johnson

      Add to Reading List

      Source URL: ohmygodel.com

      Language: English - Date: 2013-11-05 12:58:30
      35Cryptography / Cross-platform software / Dark web / Secure communication / Internet privacy / Dining cryptographers problem / I2P / Clientserver model / Internet Relay Chat / Freenet / Mix network / Peer-to-peer

      Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

      Add to Reading List

      Source URL: dedis.cs.yale.edu

      Language: English - Date: 2012-03-13 12:26:53
      36Internet privacy / Routing / Computer networking / Traceroute / Tor / Border Gateway Protocol / Hop / Proxy server / Onion routing / Computing / Internet / Network architecture

      Proceedings on Privacy Enhancing Technologies 2015; ):1–17 Joshua Juen*, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar Defending Tor from Network Adversaries: A Case Study of Network Path Predic

      Add to Reading List

      Source URL: www.ohmygodel.com

      Language: English - Date: 2015-05-23 12:03:44
      37Crowds / Communications protocol / Onion routing / Anonymity / Computing / Cryptographic protocols / Data / Internet privacy / Information

      Yale University Department of Computer Science Security Analysis of Accountable Anonymity in Dissent Ewa Syta Aaron Johnson Henry Corrigan-Gibbs

      Add to Reading List

      Source URL: www.ohmygodel.com

      Language: English - Date: 2014-08-17 14:48:08
      38Computing / Onion routing / Tor / Universal composability / Proxy server / Routing / Cisco IOS / Degree of anonymity / Internet privacy / Cryptography / Internet

      A Probabilistic Analysis of Onion Routing in a Black-box Model JOAN FEIGENBAUM, Yale University AARON JOHNSON, U.S. Naval Research Laboratory PAUL SYVERSON, U.S. Naval Research Laboratory

      Add to Reading List

      Source URL: www.ohmygodel.com

      Language: English - Date: 2012-07-09 20:58:21
      39Internet privacy / Cross-platform software / Online chat / File sharing networks / Distributed computing architecture / Freenet / I2P / Peer-to-peer / Internet Relay Chat / Computing / Software / Internet

      Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

      Add to Reading List

      Source URL: www.ohmygodel.com

      Language: English - Date: 2012-05-12 17:14:46
      40Information / Internet privacy / Crowds / IP / Public-key cryptography / Communications protocol / Onion routing / Anonymity / Alice and Bob / Cryptography / Cryptographic protocols / Data

      Security Analysis of Accountable Anonymity in Dissent EWA SYTA, HENRY CORRIGAN-GIBBS, SHU-CHUN WENG, DAVID WOLINSKY, and BRYAN FORD, Yale University AARON JOHNSON, U.S. Naval Research Laboratory Users often wish to comm

      Add to Reading List

      Source URL: www.ohmygodel.com

      Language: English - Date: 2014-08-17 14:47:48
      UPDATE