Nikita

Results: 329



#Item
1Cryptography / Public-key cryptography / Transport Layer Security / Cross-platform software / Internet protocols / Cryptographic protocols / Private information retrieval / XMPP / Forward secrecy / HTTPS / Email / WHOIS

Proceedings on Privacy Enhancing Technologies 2015; ):4–24 Nikita Borisov*, George Danezis*, and Ian Goldberg* DP5: A Private Presence Service Abstract: Users of social applications like to be notified

Add to Reading List

Source URL: www.degruyter.com

Language: English
2

TightRope: Towards Optimal Load-balancing of Paths in Anonymous Networks Hussein Darir, Hussein Sibai, Nikita Borisov, Geir Dullerud, Sayan Mitra Coordinated Science Laboratory University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: mitras.ece.illinois.edu

Language: English - Date: 2018-09-20 18:40:08
    3

    Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign, Carmela Troncoso, Alfredo Rial†

    Add to Reading List

    Source URL: carmelatroncoso.com

    Language: English - Date: 2015-11-19 22:20:42
      4

      A new window on Arctic greenhouse gases: Continuous atmospheric observations from Ambarchik on the Arctic coast in North-­Eastern Siberia Friedemann Reum1, Mathias Göckede1, Nikita Zimov3, Sergej Zimov3, Olaf Kolle1, E

      Add to Reading List

      Source URL: www.icdc10.unibe.ch

      Language: English - Date: 2017-11-20 08:59:15
        5Cryptography / Cryptographic protocols / Public key infrastructure / Public-key cryptography / CodeCon / King / Alice and Bob / Internet privacy

        Off-the-Record Communication, or, Why Not to Use PGP Nikita Borisov Ian Goldberg

        Add to Reading List

        Source URL: otr.cypherpunks.ca

        Language: English - Date: 2013-09-28 15:30:06
        6

        Proceedings on Privacy Enhancing Technologies 2015; ):4–24 Nikita Borisov*, George Danezis*, and Ian Goldberg* DP5: A Private Presence Service Abstract: Users of social applications like to be notified

        Add to Reading List

        Source URL: www.petsymposium.org

        Language: English - Date: 2015-06-23 15:36:19
          7

          The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

          Add to Reading List

          Source URL: www.jbonneau.com

          Language: English - Date: 2018-05-15 14:47:19
            8Computing / Internet / Secure communication / Information and communications technology / Internet architecture / Internet privacy / Internet Standards / Internet protocols / Mix network / Tor / Computer network / Distributed hash table

            Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity Nikita Borisov George Danezis

            Add to Reading List

            Source URL: www0.cs.ucl.ac.uk

            Language: English - Date: 2013-10-10 06:48:53
            9

            Proceedings on Privacy Enhancing Technologies 2015; ):1–17 Joshua Juen*, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar Defending Tor from Network Adversaries: A Case Study of Network Path Predic

            Add to Reading List

            Source URL: www.nrl.navy.mil

            - Date: 2015-05-18 10:21:01
              UPDATE