2009 | ||
---|---|---|
30 | Prateek Mittal, Nikita Borisov: ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. ACM Conference on Computer and Communications Security 2009: 161-172 | |
29 | Adam J. Lee, Kazuhiro Minami, Nikita Borisov: Confidentiality-preserving distributed proofs of conjunctive queries. ASIACCS 2009: 287-297 | |
28 | Amir Houmansadr, Negar Kiyavash, Nikita Borisov: RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. NDSS 2009 | |
27 | Kazuhiro Minami, Nikita Borisov, Carl A. Gunter: Safety in discretionary access control for logic-based publish-subscribe systems. SACMAT 2009: 3-12 | |
26 | Matthew M. Lucas, Nikita Borisov: flyByNight: mitigating the privacy risks of social networking. SOUPS 2009 | |
2008 | ||
25 | Nikita Borisov, Ian Goldberg: Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings Springer 2008 | |
24 | Prateek Mittal, Nikita Borisov: Information leaks in structured peer-to-peer anonymous communication systems. ACM Conference on Computer and Communications Security 2008: 267-278 | |
23 | Nikita Borisov, Soumyadeb Mitra: Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. ACNS 2008: 373-391 | |
22 | Soumyadeb Mitra, Marianne Winslett, Nikita Borisov: Deleting index entries from compliance storage. EDBT 2008: 109-120 | |
21 | Robin Snader, Nikita Borisov: A Tune-up for Tor: Improving Security and Performance in the Tor Network. NDSS 2008 | |
20 | Nabil Schear, David R. Albrecht, Nikita Borisov: High-Speed Matching of Vulnerability Signatures. RAID 2008: 155-174 | |
19 | Negar Kiyavash, Amir Houmansadr, Nikita Borisov: Multi-flow Attacks Against Network Flow Watermarking Schemes. USENIX Security Symposium 2008: 307-320 | |
18 | Matthew M. Lucas, Nikita Borisov: FlyByNight: mitigating the privacy risks of social networking. WPES 2008: 1-8 | |
17 | Kazuhiro Minami, Adam J. Lee, Marianne Winslett, Nikita Borisov: Secure aggregation in a publish-subscribe system. WPES 2008: 95-104 | |
2007 | ||
16 | Nikita Borisov, Philippe Golle: Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers Springer 2007 | |
15 | Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz: Denial of service or denial of security? ACM Conference on Computer and Communications Security 2007: 92-102 | |
14 | Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter, David Raila: Improving multi-tier security using redundant authentication. CSAW 2007: 54-62 | |
13 | Nikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, Chuanxiong Guo: Generic Application-Level Protocol Analyzer and its Language. NDSS 2007 | |
12 | Nikita Borisov, Kazuhiro Minami: Single-bit re-encryption with applications to distributed proof systems. WPES 2007: 48-55 | |
2006 | ||
11 | Nikita Borisov: Computational Puzzles as Sybil Defenses. Peer-to-Peer Computing 2006: 171-176 | |
10 | Parisa Tabriz, Nikita Borisov: Breaking the Collusion Detection Mechanism of MorphMix. Privacy Enhancing Technologies 2006: 368-383 | |
9 | Adam J. Lee, Parisa Tabriz, Nikita Borisov: A privacy-preserving interdomain audit framework. WPES 2006: 99-108 | |
2005 | ||
8 | Qiang Huang, Helen J. Wang, Nikita Borisov: Privacy-Preserving Friends Troubleshooting Network. NDSS 2005 | |
7 | Nikita Borisov: An Analysis of Parallel Mixing with Attacker-Controlled Inputs. Privacy Enhancing Technologies 2005: 12-25 | |
2004 | ||
6 | Nikita Borisov, Ian Goldberg, Eric A. Brewer: Off-the-record communication, or, why not to use PGP. WPES 2004: 77-84 | |
2002 | ||
5 | Nikita Borisov, Monica Chew, Robert Johnson, David Wagner: Multiplicative Differentials. FSE 2002: 17-33 | |
4 | Nikita Borisov, Eric A. Brewer: Active Certificates: A Framework for Delegation. NDSS 2002 | |
3 | J. Robert von Behren, Eric A. Brewer, Nikita Borisov, Michael Chen, Matt Welsh, Josh MacDonald, Jeremy Lau, David E. Culler: Ninja: A Framework for Network Services. USENIX Annual Technical Conference, General Track 2002: 87-102 | |
2001 | ||
2 | Nikita Borisov, Ian Goldberg, David Wagner: Intercepting mobile communications: the insecurity of 802.11. MOBICOM 2001: 180-189 | |
1 | Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David E. Culler, Nikita Borisov, Steven E. Czerwinski, Ramakrishna Gummadi, Jon R. Hill, Anthony D. Joseph, Randy H. Katz, Zhuoqing Morley Mao, Steven J. Ross, Ben Y. Zhao: The Ninja architecture for robust Internet-scale systems and services. Computer Networks 35(4): 473-497 (2001) |