Kohno

Results: 77



#Item
1This paper appears at the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDIDetecting and Defending Against Third-Party Tracking on the Web Franziska Roesner, Tadayoshi Kohno, and David We

This paper appears at the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDIDetecting and Defending Against Third-Party Tracking on the Web Franziska Roesner, Tadayoshi Kohno, and David We

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-03-07 03:28:10
    21  Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

    1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:01:40
    3Satellite: Joint Analysis of CDNs and Network-Level Interference Will Scott, Thomas Anderson, Tadayoshi Kohno, and Arvind Krishnamurthy {wrs, tom, yoshi, arvind}@cs.washington.edu Abstract Satellite is a methodology, too

    Satellite: Joint Analysis of CDNs and Network-Level Interference Will Scott, Thomas Anderson, Tadayoshi Kohno, and Arvind Krishnamurthy {wrs, tom, yoshi, arvind}@cs.washington.edu Abstract Satellite is a methodology, too

    Add to Reading List

    Source URL: satellite.cs.washington.edu

    Language: English - Date: 2016-06-25 01:40:31
    4This paper appears at the 38th IEEE Symposium on Security and Privacy (OaklandSecuring Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner

    This paper appears at the 38th IEEE Symposium on Security and Privacy (OaklandSecuring Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner

    Add to Reading List

    Source URL: www.franziroesner.com

    Language: English - Date: 2017-03-29 20:07:48
      5Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, and David Wetherall University of California, San Diego and University of Washington  Abstract. To

      Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, and David Wetherall University of California, San Diego and University of Washington Abstract. To

      Add to Reading List

      Source URL: homes.cs.washington.edu

      Language: English - Date: 2010-01-06 01:15:01
        6Comet: An active distributed key-value store Roxana Geambasu, Amit A. Levy, Tadayoshi Kohno, Arvind Krishnamurthy, Henry M. Levy University of Washington Abstract Distributed key-value storage systems are widely used in

        Comet: An active distributed key-value store Roxana Geambasu, Amit A. Levy, Tadayoshi Kohno, Arvind Krishnamurthy, Henry M. Levy University of Washington Abstract Distributed key-value storage systems are widely used in

        Add to Reading List

        Source URL: www.amitlevy.com

        Language: English - Date: 2012-07-22 12:12:57
          7Satellite: Joint Analysis of CDNs and Network-Level Interference Will Scott, Thomas Anderson, Tadayoshi Kohno, and Arvind Krishnamurthy, University of Washington https://www.usenix.org/conference/atc16/technical-sessions

          Satellite: Joint Analysis of CDNs and Network-Level Interference Will Scott, Thomas Anderson, Tadayoshi Kohno, and Arvind Krishnamurthy, University of Washington https://www.usenix.org/conference/atc16/technical-sessions

          Add to Reading List

          Source URL: www.usenix.org

          Language: English - Date: 2016-06-22 03:22:54
          8Computer Security and Privacy for Refugees in the United States Lucy Simko∗ , Ada Lerner† , Samia Ibtasam∗ , Franziska Roesner∗ and Tadayoshi Kohno∗ ∗ Paul  G. Allen School of Computer Science & Engineering

          Computer Security and Privacy for Refugees in the United States Lucy Simko∗ , Ada Lerner† , Samia Ibtasam∗ , Franziska Roesner∗ and Tadayoshi Kohno∗ ∗ Paul G. Allen School of Computer Science & Engineering

          Add to Reading List

          Source URL: www.franziroesner.com

          Language: English - Date: 2018-03-15 15:28:34
            9To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics∗ Tamara Bonaci† , Jeffrey Herron † , Tariq Yusuf‡ , Junjie Yan† , Tadayoshi Kohno‡ , Howard Ja

            To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics∗ Tamara Bonaci† , Jeffrey Herron † , Tariq Yusuf‡ , Junjie Yan† , Tadayoshi Kohno‡ , Howard Ja

            Add to Reading List

            Source URL: brl.ee.washington.edu

            - Date: 2015-05-14 18:28:36
              10Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 Adam Lerner∗, Anna Kornfeld Simpson∗, Tadayoshi Kohno, Franziska Roesner University of Washington {lerner

              Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 Adam Lerner∗, Anna Kornfeld Simpson∗, Tadayoshi Kohno, Franziska Roesner University of Washington {lerner

              Add to Reading List

              Source URL: trackingexcavator.cs.washington.edu

              - Date: 2016-07-20 22:37:52