dblp.uni-trier.dewww.uni-trier.de

Nikita Borisov Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
29EEAdam J. Lee, Kazuhiro Minami, Nikita Borisov: Confidentiality-preserving distributed proofs of conjunctive queries. ASIACCS 2009: 287-297
28EEAmir Houmansadr, Negar Kiyavash, Nikita Borisov: RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. NDSS 2009
27EEKazuhiro Minami, Nikita Borisov, Carl A. Gunter: Safety in discretionary access control for logic-based publish-subscribe systems. SACMAT 2009: 3-12
26EEMatthew M. Lucas, Nikita Borisov: flyByNight: mitigating the privacy risks of social networking. SOUPS 2009
2008
25 Nikita Borisov, Ian Goldberg: Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings Springer 2008
24EEPrateek Mittal, Nikita Borisov: Information leaks in structured peer-to-peer anonymous communication systems. ACM Conference on Computer and Communications Security 2008: 267-278
23EENikita Borisov, Soumyadeb Mitra: Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. ACNS 2008: 373-391
22EESoumyadeb Mitra, Marianne Winslett, Nikita Borisov: Deleting index entries from compliance storage. EDBT 2008: 109-120
21EERobin Snader, Nikita Borisov: A Tune-up for Tor: Improving Security and Performance in the Tor Network. NDSS 2008
20EENabil Schear, David R. Albrecht, Nikita Borisov: High-Speed Matching of Vulnerability Signatures. RAID 2008: 155-174
19EENegar Kiyavash, Amir Houmansadr, Nikita Borisov: Multi-flow Attacks Against Network Flow Watermarking Schemes. USENIX Security Symposium 2008: 307-320
18EEMatthew M. Lucas, Nikita Borisov: FlyByNight: mitigating the privacy risks of social networking. WPES 2008: 1-8
17EEKazuhiro Minami, Adam J. Lee, Marianne Winslett, Nikita Borisov: Secure aggregation in a publish-subscribe system. WPES 2008: 95-104
2007
16 Nikita Borisov, Philippe Golle: Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers Springer 2007
15EENikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz: Denial of service or denial of security? ACM Conference on Computer and Communications Security 2007: 92-102
14EEJodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter, David Raila: Improving multi-tier security using redundant authentication. CSAW 2007: 54-62
13EENikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, Chuanxiong Guo: Generic Application-Level Protocol Analyzer and its Language. NDSS 2007
12EENikita Borisov, Kazuhiro Minami: Single-bit re-encryption with applications to distributed proof systems. WPES 2007: 48-55
2006
11EENikita Borisov: Computational Puzzles as Sybil Defenses. Peer-to-Peer Computing 2006: 171-176
10EEParisa Tabriz, Nikita Borisov: Breaking the Collusion Detection Mechanism of MorphMix. Privacy Enhancing Technologies 2006: 368-383
9EEAdam J. Lee, Parisa Tabriz, Nikita Borisov: A privacy-preserving interdomain audit framework. WPES 2006: 99-108
2005
8EEQiang Huang, Helen J. Wang, Nikita Borisov: Privacy-Preserving Friends Troubleshooting Network. NDSS 2005
7EENikita Borisov: An Analysis of Parallel Mixing with Attacker-Controlled Inputs. Privacy Enhancing Technologies 2005: 12-25
2004
6EENikita Borisov, Ian Goldberg, Eric A. Brewer: Off-the-record communication, or, why not to use PGP. WPES 2004: 77-84
2002
5EENikita Borisov, Monica Chew, Robert Johnson, David Wagner: Multiplicative Differentials. FSE 2002: 17-33
4EENikita Borisov, Eric A. Brewer: Active Certificates: A Framework for Delegation. NDSS 2002
3EEJ. Robert von Behren, Eric A. Brewer, Nikita Borisov, Michael Chen, Matt Welsh, Josh MacDonald, Jeremy Lau, David E. Culler: Ninja: A Framework for Network Services. USENIX Annual Technical Conference, General Track 2002: 87-102
2001
2EENikita Borisov, Ian Goldberg, David Wagner: Intercepting mobile communications: the insecurity of 802.11. MOBICOM 2001: 180-189
1EESteven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David E. Culler, Nikita Borisov, Steven E. Czerwinski, Ramakrishna Gummadi, Jon R. Hill, Anthony D. Joseph, Randy H. Katz, Zhuoqing Morley Mao, Steven J. Ross, Ben Y. Zhao: The Ninja architecture for robust Internet-scale systems and services. Computer Networks 35(4): 473-497 (2001)

Coauthor Index

1David R. Albrecht [20]
2J. Robert von Behren [1] [3]
3Jodie P. Boyer [14]
4Eric A. Brewer [1] [3] [4] [6]
5David Brumley [13]
6Michael Chen [3]
7Monica Chew [5]
8David E. Culler [1] [3]
9Steven E. Czerwinski [1]
10George Danezis [15]
11John Dunagan [13]
12Ian Goldberg [2] [6] [25]
13Philippe Golle [16]
14Steven D. Gribble [1]
15Ramakrishna Gummadi [1]
16Carl A. Gunter [14] [27]
17Chuanxiong Guo [13]
18Ragib Hasan [14]
19Jon R. Hill [1]
20Amir Houmansadr (Amir Houman Sadr) [19] [28]
21Qiang Huang [8]
22Robert Johnson [5]
23Anthony D. Joseph [1]
24Pallavi Joshi [13]
25Randy H. Katz [1]
26Negar Kiyavash [19] [28]
27Jeremy Lau [3]
28Adam J. Lee [9] [17] [29]
29Matthew M. Lucas [18] [26]
30Josh MacDonald [3]
31Zhuoqing Morley Mao [1]
32Kazuhiro Minami [12] [17] [27] [29]
33Soumyadeb Mitra [22] [23]
34Prateek Mittal [15] [24]
35Lars E. Olson [14]
36David Raila [14]
37Steven J. Ross [1]
38Nabil Schear [20]
39Robin Snader [21]
40Parisa Tabriz [9] [10] [15]
41David Wagner [2] [5]
42Helen J. Wang [8] [13]
43Matt Welsh [1] [3]
44Marianne Winslett [17] [22]
45Ben Y. Zhao [1]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)