Scott Thomas

Results: 254



#Item
31

Generation of degenerate, factorizable, pulsed squeezed light at telecom wavelengths Thomas Gerrits1, Martin J. Stevens1, Burm Baek1, Brice Calkins1, Adriana Lita1, Scott Glancy1, Emanuel Knill1, Sae Woo Nam1, Richard P.

Add to Reading List

Source URL: zwillerlab.tudelft.nl

Language: English - Date: 2011-12-02 08:07:12
    32

    Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail Kevin P. Dyer∗ , Scott E. Coull† , Thomas Ristenpart‡ , and Thomas Shrimpton∗ ∗ Department of Computer Science, Portland State U

    Add to Reading List

    Source URL: web.cecs.pdx.edu

    Language: English - Date: 2012-03-06 13:44:01
      33

      Blocking-Resistant Network Services using Unblock Will Scott, Raymond Cheng, Jinyang Li, Arvind Krishnamurthy, Thomas Anderson significant political, social, and economic costs 1 . Unlike more aggressive forms of censors

      Add to Reading List

      Source URL: unblock.cs.washington.edu

      Language: English - Date: 2012-09-20 20:05:57
        34

        Jitsu: Just-In-Time Summoning of Unikernels Anil Madhavapeddy, Thomas Leonard, Magnus Skjegstad, Thomas Gazagnaire, and David Sheets, University of Cambridge; Dave Scott, Citrix Systems UK Ltd.; Richard Mortier, Amir Cha

        Add to Reading List

        Source URL: www.usenix.org

        Language: English
          35

          Marionette: A Programmable Network Traffic Obfuscation System Kevin P. Dyer, Portland State University; Scott E. Coull, RedJack LLC.; Thomas Shrimpton, Portland State University https://www.usenix.org/conference/usenixse

          Add to Reading List

          Source URL: www.usenix.org

          Language: English
            36

            Previews Ambler Theater DECEMBERFEBRUARYKristin Scott Thomas in I’VE LOVED YOU SO LONG

            Add to Reading List

            Source URL: amblertheater.org

            Language: English - Date: 2014-07-15 12:06:37
              37

              The Pythia PRF Service Adam Everspaugh, Rahul Chatterjee, 
 Sam Scott, Ari Juels, Thomas Ristenpart Summary Passwords: Ubiquitous, but vulnerable to offline

              Add to Reading List

              Source URL: pages.cs.wisc.edu

              Language: English - Date: 2016-03-03 14:55:53
                38

                Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail Kevin P. Dyer∗ , Scott E. Coull† , Thomas Ristenpart‡ , and Thomas Shrimpton∗ ∗ Department of Computer Science, Portland State U

                Add to Reading List

                Source URL: www.scottcoull.com

                Language: English - Date: 2014-03-03 12:03:20
                  39

                  Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail Kevin P. Dyer∗ , Scott E. Coull† , Thomas Ristenpart‡ , and Thomas Shrimpton∗ ∗ Department of Computer Science, Portland State U

                  Add to Reading List

                  Source URL: kpdyer.com

                  Language: English - Date: 2015-08-17 17:04:54
                    40

                    CURRICULUM VITAE Thomas Wallace Scott Distinguished Professor Director, Vector-Borne Disease Laboratory Department of Entomology and Nematology

                    Add to Reading List

                    Source URL: entomology.ucdavis.edu

                    Language: English - Date: 2015-02-17 11:04:37
                      UPDATE