|
|
2024 |
Enabling Cross-Platform Comparison of Online Communities Using Content and Opinion Similarity
A Quantitative Analysis of Inappropriate Content, Age Rating Compliance, and Risks to Youth on the Whisper Platform
Triage of Messages and Conversations in a Large-Scale Child Victimization Corpus
Chapter: Reference Guide on Computer Science [To appear]
|
2022 |
Pricing Security in Proof-of-Work Systems
Indications of Child Sexual Abuse Revealed in App-Store Reviews
Report to Congress: Increasing the Efficacy of Investigations of Online Child Sexual Exploitation
|
2020 |
A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet.
Re-identification of Mobile Devices Using Real-Time Bidding Advertising Networks
Protecting location privacy from untrusted wireless service providers
Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance
Tor Hidden Services Are a Failed Technology, Harming Children, Dissidents and Journalists
|
2019 |
Bonded Mining: Difficulty Adjustment by Miner Commitment
Shining Light on Internet-based Crimes Against Children
Graphene: Efficient Interactive Set Reconciliation Applied to Blockchain Propagation
Server-side traffic analysis reveals mobile location information over the Internet
|
2018 |
Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies
MicroMobile: Leveraging Mobile Advertising for Large-Scale Experimentation
|
2017 |
Forensic Identification of Anonymous Sources in OneSwarm
Market-based Security for Distributed Applications
Advertising-based Measurement: A Platform of 7 Billion Mobile Devices
Graphene: A New Protocol for Block Propagation Using Set Reconciliation
Estimation of Miner Hash Rates and Consensus on Blockchains
Statistical Detection of Downloaders in Freenet
An Explanation of Nakamoto's Analysis of Double-spend Attacks
|
2016 |
An Analysis of Attacks on Blockchain Consensus
Characterization of Contact Offenders and Child Exploitation Material Trafficking on Five Peer-to-Peer Networks
|
2015 |
Discovering Specification Violations in Networked Software Systems
|
2014 |
Sybil-Resistant Mixing for Bitcoin
Efficient Smart Phone Forensics Based on Relevance Feedback
Efficient Tagging of Remote Peers During Child Pornography Investigations
Location Privacy without Carrier Cooperation
Measuring a year of child pornography trafficking by US computers on a peer-to-peer network
|
2013 |
Turning Off GPS is Not Enough: Cellular location leaks over the Internet
Measurement and Analysis of Child Pornography Trafficking on P2P Networks
Disambiguation of Residential Wired and Wireless Access in a Forensic Setting
|
2012 |
Functional Privacy or Why Cookies are Better with Milk
|
2011 |
Low Spreading Loss in Underwater Acoustic Networks Reduces RTS/CTS Effectiveness
Concurrent Wi-Fi for Mobile Users: Analysis and Measurements
Forensic Investigation of the OneSwarm Anonymous Filesharing System
A retrospective look at the UMass DOME mobile testbed (invited)
Economic Incentives for Protecting Digital Rights Online
Spider: Improving Mobile Networking with Concurrent Wi-Fi Connections (Poster)
Forensic Triage for Mobile Phones with DEC0DE
Effective Digital Forensics Research is Investigator-Centric
Empirical Tests of Anonymous Voice Over IP
|
2010 |
Assessing the Vulnerability of Replicated Network Services
Strengthening Forensic Investigations of Child Pornography on P2P Networks
Reverse Engineering for Mobile Systems Forensics with Ares
Forensic Investigation of Peer-to-Peer File Sharing Networks
Spatial Reuse in Underwater Acoustic Networks using RTS/CTS MAC Protocols
Replication Routing in DTNs: A Resource Allocation Approach
Design and Field Experimentation of an Energy-Efficient Architecture for DTN Throwboxes
|
2009 |
DEX: Digital Evidence Provenance Supporting Reproducibility and Comparison
Auditing and Forensic Analysis
DOME: A Diverse Outdoor Mobile Testbed
|
2008 |
Enhancing Child Safety \& Online Technologies. Appendix D: Technology Advisory Board Report
Enabling Interactive Web Applications in Hybrid Networks
Relays, Base Stations, and Meshes: Enhancing Mobile Networks with Infrastructure
Interactive WiFi Connectivity for Moving Vehicles
MORA Routing and Capacity Building in Disruption-Tolerant Networks
Passive-Logging Attacks Against Anonymous Communications Systems
Quantifying Resistance to the Sybil Attack
|
2007 |
A Survey of Practical Issues in Underwater Networks
Surviving Attacks on Disruption-Tolerant Networks without Authentication
Study of a Bus-Based Disruption Tolerant Network: Mobility Modeling and Impact on Routing
Web Search From a Bus
DTN Routing as a Resource Allocation Problem
Bounding Damage From Link Destruction with Application to the Internet (extended abstract)
Threats to Privacy in the Forensic Analysis of Database Systems
An Energy-Efficient Architecture for DTN Throwboxes
Cheat-Proof Playout for Centralized and Peer-to-Peer Gaming
Informant: Detecting Sybils Using Incentives
Securing History: Privacy and Accountability in Database Systems
|
2006 |
Maximizing Transfer Opportunities in Bluetooth DTNs
A Survey of Solutions to the Sybil Attack
Inferring the Source of Encrypted HTTP Connections
Capacity Enhancement using Throwboxes in DTNs
A Survey of Practical Issues in Underwater Networks
Detecting the Sybil Attack in Ad hoc Networks
Autonomous Enhancement of Disruption Tolerant Networks
MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks (2017 Test of Time Award Winner)
|
2005 |
On the Cost-Ineffectiveness of Redundancy in Commercial P2P Computing
Creating Social Networks to Improve Peer-to-Peer Networking
Supporting P2P Gaming When Players Have Heterogeneous Resources
Privacy Vulnerabilities in Encrypted HTTP Streams
MV Routing and Capacity Building in Disruption Tolerant Networks
Authenticated Routing for Ad hoc Networks
Distributed Information Retrieval For Disruption-Tolerant Mobile Networks
|
2004 |
The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems
Analysis of an Incentives-based Protection System
Information Sharing in Out-of-Hospital Disaster Response: The Future Role of Information Technology
A Multi-agent Approach for Peer-to-Peer based Information Retrieval System
Exploring the Use of BitTorrent as the Basis for a Large Trace Repository
An Evaluation of Chord Using Traces of Peer-to-Peer File Sharing (extended abstract)
SPIES: Secrets Protection Incentives-based Escrow System
Surviving Attacks on DNS using Ubiquitous Replication
Timing Attacks in Low-Latency Mix Systems
|
2003 |
Mobile Distributed Information Retrieval For Highly Partitioned Networks
Organizing Multicast Receivers Deterministically According to Packet-Loss Correlation
Defending Anonymous Communication Against Passive Logging Attacks
Adaptive Peer Selection
|
2002 |
A Secure Routing Protocol for Ad hoc Networks
Hordes --- A Multicast Based Protocol for Anonymity
Availability and Locality Measurements of Peer-to-Peer File Systems
An Analysis of the Degradation of Anonymous Protocols
|
2001 |
Evaluation of a Novel Two-Step Server Selection Metric
Responder Anonymity and Anonymous Peer-to-Peer File Sharing
Wearable Computers and Packet Transport Mechanisms in Highly Partitioned Ad hoc Networks
Cheat-Proof Playout for Centralized and Distributed Online Games
|
2000 |
A Protocol for Anonymous Communication Over the Internet
A Hierarchical Multicast Monitoring Scheme
Consideration of Receiver Interest for IP Multicast Delivery
Deployment Issues for the IP Multicast Service and Architecture
|
1999 |
11: IP Multicast Routing
Network Support for Group Communication
|
1998 |
Organizing Multicast Receivers Deterministically According to Packet-Loss Correlation
A Comparison of Reliable Multicast Protocols
|
1997 |
Improving Internet Multicast with Routing Labels
6: End-to-End Reliable Multicast
|
1996 |
The Case for Reliable Concurrent Multicasting Using Shared Ack Trees
A Comparison of Known Classes of Reliable Multicast Protocols
A Comparison of Known Classes of Reliable Multicast Protocols
|