1![This paper appears at the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDIDetecting and Defending Against Third-Party Tracking on the Web Franziska Roesner, Tadayoshi Kohno, and David We This paper appears at the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDIDetecting and Defending Against Third-Party Tracking on the Web Franziska Roesner, Tadayoshi Kohno, and David We](https://www.pdfsearch.io/img/1c348bb7f6e855d467d5f73aae38d488.jpg) | Add to Reading ListSource URL: www.doc.ic.ac.ukLanguage: English - Date: 2016-03-07 03:28:10
|
---|
2![1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington 1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington](https://www.pdfsearch.io/img/7c874b473559a74e393dfdf1a79b3662.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 16:01:40
|
---|
3![Satellite: Joint Analysis of CDNs and Network-Level Interference Will Scott, Thomas Anderson, Tadayoshi Kohno, and Arvind Krishnamurthy {wrs, tom, yoshi, arvind}@cs.washington.edu Abstract Satellite is a methodology, too Satellite: Joint Analysis of CDNs and Network-Level Interference Will Scott, Thomas Anderson, Tadayoshi Kohno, and Arvind Krishnamurthy {wrs, tom, yoshi, arvind}@cs.washington.edu Abstract Satellite is a methodology, too](https://www.pdfsearch.io/img/c71247817b7f8e4107e2f468ee9bfc01.jpg) | Add to Reading ListSource URL: satellite.cs.washington.eduLanguage: English - Date: 2016-06-25 01:40:31
|
---|
4![This paper appears at the 38th IEEE Symposium on Security and Privacy (OaklandSecuring Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner This paper appears at the 38th IEEE Symposium on Security and Privacy (OaklandSecuring Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner](https://www.pdfsearch.io/img/b5045171f7ecfc0dec36ebea73b210f6.jpg) | Add to Reading ListSource URL: www.franziroesner.comLanguage: English - Date: 2017-03-29 20:07:48
|
---|
5![Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, and David Wetherall University of California, San Diego and University of Washington Abstract. To Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, and David Wetherall University of California, San Diego and University of Washington Abstract. To](https://www.pdfsearch.io/img/8c30c03283995a7d14d10a9ca0678cc0.jpg) | Add to Reading ListSource URL: homes.cs.washington.eduLanguage: English - Date: 2010-01-06 01:15:01
|
---|
6![Comet: An active distributed key-value store Roxana Geambasu, Amit A. Levy, Tadayoshi Kohno, Arvind Krishnamurthy, Henry M. Levy University of Washington Abstract Distributed key-value storage systems are widely used in Comet: An active distributed key-value store Roxana Geambasu, Amit A. Levy, Tadayoshi Kohno, Arvind Krishnamurthy, Henry M. Levy University of Washington Abstract Distributed key-value storage systems are widely used in](https://www.pdfsearch.io/img/8b311e5474bfc7d97fbc3f849a6b596c.jpg) | Add to Reading ListSource URL: www.amitlevy.comLanguage: English - Date: 2012-07-22 12:12:57
|
---|
7![Satellite: Joint Analysis of CDNs and Network-Level Interference Will Scott, Thomas Anderson, Tadayoshi Kohno, and Arvind Krishnamurthy, University of Washington https://www.usenix.org/conference/atc16/technical-sessions Satellite: Joint Analysis of CDNs and Network-Level Interference Will Scott, Thomas Anderson, Tadayoshi Kohno, and Arvind Krishnamurthy, University of Washington https://www.usenix.org/conference/atc16/technical-sessions](https://www.pdfsearch.io/img/c4e6bbaba505d5b31b3bbb577fbf01d4.jpg) | Add to Reading ListSource URL: www.usenix.orgLanguage: English - Date: 2016-06-22 03:22:54
|
---|
8![Computer Security and Privacy for Refugees in the United States Lucy Simko∗ , Ada Lerner† , Samia Ibtasam∗ , Franziska Roesner∗ and Tadayoshi Kohno∗ ∗ Paul G. Allen School of Computer Science & Engineering Computer Security and Privacy for Refugees in the United States Lucy Simko∗ , Ada Lerner† , Samia Ibtasam∗ , Franziska Roesner∗ and Tadayoshi Kohno∗ ∗ Paul G. Allen School of Computer Science & Engineering](https://www.pdfsearch.io/img/135b4684e485de195a5fa69e3fd7a1c3.jpg) | Add to Reading ListSource URL: www.franziroesner.comLanguage: English - Date: 2018-03-15 15:28:34
|
---|
9![To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics∗ Tamara Bonaci† , Jeffrey Herron † , Tariq Yusuf‡ , Junjie Yan† , Tadayoshi Kohno‡ , Howard Ja To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics∗ Tamara Bonaci† , Jeffrey Herron † , Tariq Yusuf‡ , Junjie Yan† , Tadayoshi Kohno‡ , Howard Ja](https://www.pdfsearch.io/img/7b135f3dbb723ce1e6321b9243fc1107.jpg) | Add to Reading ListSource URL: brl.ee.washington.edu- Date: 2015-05-14 18:28:36
|
---|
10![Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 Adam Lerner∗, Anna Kornfeld Simpson∗, Tadayoshi Kohno, Franziska Roesner University of Washington {lerner Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 Adam Lerner∗, Anna Kornfeld Simpson∗, Tadayoshi Kohno, Franziska Roesner University of Washington {lerner](https://www.pdfsearch.io/img/d4b6efd8f9da992f633f8802dcb8d47d.jpg) | Add to Reading ListSource URL: trackingexcavator.cs.washington.edu- Date: 2016-07-20 22:37:52
|
---|