Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kevin S. Bauer
@inproceedings{DBLP:conf/ndss/WacekTBS13, author = {Chris Wacek and Henry Tan and Kevin S. Bauer and Micah Sherr}, title = {An Empirical Evaluation of Relay Selection in Tor}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/empirical-evaluation-relay-selection-tor}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WacekTBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/AlSabahBEG13, author = {Mashael AlSabah and Kevin S. Bauer and Tariq Elahi and Ian Goldberg}, editor = {Emiliano De Cristofaro and Matthew K. Wright}, title = {The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting}, booktitle = {Privacy Enhancing Technologies - 13th International Symposium, {PETS} 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7981}, pages = {143--163}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39077-7\_8}, doi = {10.1007/978-3-642-39077-7\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/AlSabahBEG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlSabahBG12, author = {Mashael AlSabah and Kevin S. Bauer and Ian Goldberg}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Enhancing Tor's performance using real-time traffic classification}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {73--84}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382208}, doi = {10.1145/2382196.2382208}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AlSabahBG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/WangBFG12, author = {Tao Wang and Kevin S. Bauer and Clara Forero and Ian Goldberg}, editor = {Angelos D. Keromytis}, title = {Congestion-Aware Path Selection for Tor}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {98--113}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_9}, doi = {10.1007/978-3-642-32946-3\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/WangBFG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JansenBHD12, author = {Rob Jansen and Kevin S. Bauer and Nicholas Hopper and Roger Dingledine}, editor = {Sean Peisert and Stephen Schwab}, title = {Methodically Modeling the Tor Network}, booktitle = {5th Workshop on Cyber Security Experimentation and Test, {CSET} '12, Bellevue, WA, USA, August 6, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/cset12/workshop-program/presentation/jansen}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/JansenBHD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/ElahiBADG12, author = {Tariq Elahi and Kevin S. Bauer and Mashael AlSabah and Roger Dingledine and Ian Goldberg}, editor = {Ting Yu and Nikita Borisov}, title = {Changing of the guards: a framework for understanding and improving entry guard selection in tor}, booktitle = {Proceedings of the 11th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2012, Raleigh, NC, USA, October 15, 2012}, pages = {43--54}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381966.2381973}, doi = {10.1145/2381966.2381973}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/wpes/ElahiBADG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/AlSabahBGGMSV11, author = {Mashael AlSabah and Kevin S. Bauer and Ian Goldberg and Dirk Grunwald and Damon McCoy and Stefan Savage and Geoffrey M. Voelker}, editor = {Simone Fischer{-}H{\"{u}}bner and Nicholas Hopper}, title = {DefenestraTor: Throwing Out Windows in Tor}, booktitle = {Privacy Enhancing Technologies - 11th International Symposium, {PETS} 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6794}, pages = {134--154}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22263-4\_8}, doi = {10.1007/978-3-642-22263-4\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/AlSabahBGGMSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BauerSG11, author = {Kevin S. Bauer and Micah Sherr and Dirk Grunwald}, editor = {Sean Peisert and Stephen Schwab}, title = {ExperimenTor: {A} Testbed for Safe and Realistic Tor Experimentation}, booktitle = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11, San Francisco, CA, USA, August 8, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/cset11/experimentor-testbed-safe-and-realistic-tor-experimentation}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/BauerSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/GonzalesBLMS10, author = {Harold Gonzales and Kevin S. Bauer and Janne Lindqvist and Damon McCoy and Douglas C. Sicker}, title = {Practical Defenses for Evil Twin Attacks in 802.11}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5684213}, doi = {10.1109/GLOCOM.2010.5684213}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/GonzalesBLMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/BauerMABGGS09, author = {Kevin S. Bauer and Damon McCoy and Eric W. Anderson and Markus Breitenbach and Gregory Z. Grudic and Dirk Grunwald and Douglas C. Sicker}, title = {The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5425737}, doi = {10.1109/GLOCOM.2009.5425737}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/BauerMABGGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/BauerGS09, author = {Kevin S. Bauer and Dirk Grunwald and Douglas C. Sicker}, title = {Predicting Tor path compromise by exit port}, booktitle = {28th International Performance Computing and Communications Conference, {IPCCC} 2009, 14-16 December 2009, Phoenix, Arizona, {USA}}, pages = {384--387}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/PCCC.2009.5403852}, doi = {10.1109/PCCC.2009.5403852}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/BauerGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/AndersonPGBSG09, author = {Eric Anderson and Caleb T. Phillips and Harold Gonzales and Kevin S. Bauer and Douglas C. Sicker and Dirk Grunwald}, editor = {Xiaoming Fu and Pan Hui}, title = {SniffMob: inferring human contact patterns using wireless devices}, booktitle = {Proceedings of the 1st {ACM} International Workshop on Hot Topics of Planet-Scale Mobility Measurements, HotPlanet@MobiSys 2009, Wroclaw, Poland, June 22-25, 2009}, pages = {4}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1651428.1651434}, doi = {10.1145/1651428.1651434}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/AndersonPGBSG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/BauerMGGS09, author = {Kevin S. Bauer and Damon McCoy and Ben Greenstein and Dirk Grunwald and Douglas C. Sicker}, editor = {Ian Goldberg and Mikhail J. Atallah}, title = {Physical Layer Attacks on Unlinkability in Wireless LANs}, booktitle = {Privacy Enhancing Technologies, 9th International Symposium, {PETS} 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5672}, pages = {108--127}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03168-7\_7}, doi = {10.1007/978-3-642-03168-7\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pet/BauerMGGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapia/BauerMGGS09, author = {Kevin S. Bauer and Damon McCoy and Ben Greenstein and Dirk Grunwald and Douglas C. Sicker}, editor = {Nina M. Berry}, title = {Performing traffic analysis on a wireless identifier-free link layer}, booktitle = {Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, Initiatives, Insight, and Innovations, Portland, Oregon, USA, April 1-4, 2009}, pages = {18--23}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1565799.1565804}, doi = {10.1145/1565799.1565804}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tapia/BauerMGGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BauerMGS09, author = {Kevin S. Bauer and Damon McCoy and Dirk Grunwald and Douglas C. Sicker}, title = {BitStalker: Accurately and efficiently monitoring bittorrent traffic}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {181--185}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386457}, doi = {10.1109/WIFS.2009.5386457}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/BauerMGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/BauerGM08, author = {Kevin S. Bauer and Harold Gonzales and Damon McCoy}, editor = {Ty Znati and Youtao Zhang}, title = {Mitigating Evil Twin Attacks in 802.11}, booktitle = {2008 {IEEE} International Performance, Computing and Communications Conference, {IPCCC} 2008, Austin, TX, USA, December 7-9, 2008}, pages = {513--516}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PCCC.2008.4745081}, doi = {10.1109/PCCC.2008.4745081}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/BauerGM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/McCoyBGKS08, author = {Damon McCoy and Kevin S. Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas C. Sicker}, editor = {Nikita Borisov and Ian Goldberg}, title = {Shining Light in Dark Places: Understanding the Tor Network}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {63--76}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_5}, doi = {10.1007/978-3-540-70630-4\_5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pet/McCoyBGKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/BauerMGS08, author = {Kevin S. Bauer and Damon McCoy and Dirk Grunwald and Douglas C. Sicker}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {BitBlender: Light-Weight Anonymity for BitTorrent}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1461464.1461465}, doi = {10.1145/1461464.1461465}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/BauerMGS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/AndersonPBGS08, author = {Eric W. Anderson and Caleb T. Phillips and Kevin S. Bauer and Dirk Grunwald and Douglas C. Sicker}, editor = {Zhen Liu and Vishal Misra and Prashant J. Shenoy}, title = {Modeling directionality in wireless networks: extended abstract}, booktitle = {Proceedings of the 2008 {ACM} {SIGMETRICS} International Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2008, Annapolis, MD, USA, June 2-6, 2008}, pages = {443--444}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375457.1375512}, doi = {10.1145/1375457.1375512}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmetrics/AndersonPBGS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BauerMGKS07, author = {Kevin S. Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas C. Sicker}, editor = {Peng Ning and Ting Yu}, title = {Low-resource routing attacks against tor}, booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007}, pages = {11--20}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314333.1314336}, doi = {10.1145/1314333.1314336}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BauerMGKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.