31![Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems](https://www.pdfsearch.io/img/45ac664fd240d77337b37430466b5d58.jpg) | Add to Reading ListSource URL: www.hatswitch.orgLanguage: English - Date: 2013-02-08 04:48:01
|
---|
32![The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu](https://www.pdfsearch.io/img/b6cb8c1e4e47a8ab44925efd61fbc8c2.jpg) | Add to Reading ListSource URL: www.hatswitch.orgLanguage: English - Date: 2014-02-06 09:59:49
|
---|
33![Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems](https://www.pdfsearch.io/img/0a903939ddebfca153f3bfbb257d9bd0.jpg) | Add to Reading ListSource URL: fc13.ifca.aiLanguage: English - Date: 2013-03-27 20:42:00
|
---|
34![Re3: Relay Reliability Reputation for Anonymity Systems Anupam Das, Nikita Borisov University of Illinois at Urbana-Champaign {das17,nikita}@illinois.edu Re3: Relay Reliability Reputation for Anonymity Systems Anupam Das, Nikita Borisov University of Illinois at Urbana-Champaign {das17,nikita}@illinois.edu](https://www.pdfsearch.io/img/a074b2e025a8b1d369233fcfffa852b8.jpg) | Add to Reading ListSource URL: www.hatswitch.orgLanguage: English - Date: 2014-06-02 11:43:39
|
---|
35![A. Voronov, D. Vatolin, D. Sumin, V. Napadovsky, A. Borisov, “Towards Automatic Stereo-video Quality Assessment and Detection of Color and Sharpness Mismatch,” International Conference on 3D Imaging (IC3D), pp. 1–6 A. Voronov, D. Vatolin, D. Sumin, V. Napadovsky, A. Borisov, “Towards Automatic Stereo-video Quality Assessment and Detection of Color and Sharpness Mismatch,” International Conference on 3D Imaging (IC3D), pp. 1–6](https://www.pdfsearch.io/img/00130919e4818fabf53058895479cd13.jpg) | Add to Reading ListSource URL: compression.ruLanguage: English - Date: 2014-01-07 08:02:34
|
---|
36![RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows Amir Houmansadr∗ Negar Kiyavash† Nikita Borisov∗ ∗ Dept. of Electrical and Computer Engineering † RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows Amir Houmansadr∗ Negar Kiyavash† Nikita Borisov∗ ∗ Dept. of Electrical and Computer Engineering †](https://www.pdfsearch.io/img/7c5da6999ca0037e9f870a80fe56f546.jpg) | Add to Reading ListSource URL: www.hatswitch.orgLanguage: English - Date: 2012-08-17 09:53:18
|
---|
37![Proceedings on Privacy Enhancing Technologies 2015; ):171–187 Joshua Juen*, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar Defending Tor from Network Adversaries: A Case Study of Network Path Pre Proceedings on Privacy Enhancing Technologies 2015; ):171–187 Joshua Juen*, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar Defending Tor from Network Adversaries: A Case Study of Network Path Pre](https://www.pdfsearch.io/img/d3d34f407849eb07ba515b7cad507e50.jpg) | Add to Reading ListSource URL: web.engr.illinois.eduLanguage: English - Date: 2015-06-30 14:26:57
|
---|
38![A. Voronov, A. Borisov, D. Vatolin, “System for Automatic Detection of Distorted Scenes in Stereo Video,” International Workshop on Video Processing and Quality Metrics (VPQM), 2012 SYSTEM FOR AUTOMATIC DETECTION OF A. Voronov, A. Borisov, D. Vatolin, “System for Automatic Detection of Distorted Scenes in Stereo Video,” International Workshop on Video Processing and Quality Metrics (VPQM), 2012 SYSTEM FOR AUTOMATIC DETECTION OF](https://www.pdfsearch.io/img/892e4f067d9f4f3707e2804b30f4718c.jpg) | Add to Reading ListSource URL: compression.ruLanguage: English - Date: 2014-01-07 08:02:33
|
---|
39![Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov University of Illinois at Urbana-Champaign arX Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov University of Illinois at Urbana-Champaign arX](https://www.pdfsearch.io/img/daf225f8a1237e18220c495cfc1efaf9.jpg) | Add to Reading ListSource URL: arxiv.orgLanguage: English - Date: 2011-11-23 22:49:46
|
---|
40![A. Voronov, D. Vatolin, D. Sumin, V. Napadovsky, and A. Borisov, “Methodology for stereoscopic motion-picture quality assessment,” Stereoscopic Displays and Applications, vol. 8648, pp–1–864810–14, 2013 A. Voronov, D. Vatolin, D. Sumin, V. Napadovsky, and A. Borisov, “Methodology for stereoscopic motion-picture quality assessment,” Stereoscopic Displays and Applications, vol. 8648, pp–1–864810–14, 2013](https://www.pdfsearch.io/img/a593aad435b78852017b01d5cd8107ae.jpg) | Add to Reading ListSource URL: compression.ruLanguage: English - Date: 2014-01-07 08:02:30
|
---|