BibTeX records: Kevin S. Bauer

download as .bib file

@inproceedings{DBLP:conf/ndss/WacekTBS13,
  author       = {Chris Wacek and
                  Henry Tan and
                  Kevin S. Bauer and
                  Micah Sherr},
  title        = {An Empirical Evaluation of Relay Selection in Tor},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/empirical-evaluation-relay-selection-tor},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WacekTBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/AlSabahBEG13,
  author       = {Mashael AlSabah and
                  Kevin S. Bauer and
                  Tariq Elahi and
                  Ian Goldberg},
  editor       = {Emiliano De Cristofaro and
                  Matthew K. Wright},
  title        = {The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic
                  Splitting},
  booktitle    = {Privacy Enhancing Technologies - 13th International Symposium, {PETS}
                  2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7981},
  pages        = {143--163},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39077-7\_8},
  doi          = {10.1007/978-3-642-39077-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/AlSabahBEG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlSabahBG12,
  author       = {Mashael AlSabah and
                  Kevin S. Bauer and
                  Ian Goldberg},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Enhancing Tor's performance using real-time traffic classification},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382208},
  doi          = {10.1145/2382196.2382208},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AlSabahBG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/WangBFG12,
  author       = {Tao Wang and
                  Kevin S. Bauer and
                  Clara Forero and
                  Ian Goldberg},
  editor       = {Angelos D. Keromytis},
  title        = {Congestion-Aware Path Selection for Tor},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {98--113},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_9},
  doi          = {10.1007/978-3-642-32946-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/WangBFG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JansenBHD12,
  author       = {Rob Jansen and
                  Kevin S. Bauer and
                  Nicholas Hopper and
                  Roger Dingledine},
  editor       = {Sean Peisert and
                  Stephen Schwab},
  title        = {Methodically Modeling the Tor Network},
  booktitle    = {5th Workshop on Cyber Security Experimentation and Test, {CSET} '12,
                  Bellevue, WA, USA, August 6, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/cset12/workshop-program/presentation/jansen},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JansenBHD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/ElahiBADG12,
  author       = {Tariq Elahi and
                  Kevin S. Bauer and
                  Mashael AlSabah and
                  Roger Dingledine and
                  Ian Goldberg},
  editor       = {Ting Yu and
                  Nikita Borisov},
  title        = {Changing of the guards: a framework for understanding and improving
                  entry guard selection in tor},
  booktitle    = {Proceedings of the 11th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2012, Raleigh, NC, USA, October 15, 2012},
  pages        = {43--54},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381966.2381973},
  doi          = {10.1145/2381966.2381973},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/ElahiBADG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/AlSabahBGGMSV11,
  author       = {Mashael AlSabah and
                  Kevin S. Bauer and
                  Ian Goldberg and
                  Dirk Grunwald and
                  Damon McCoy and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Nicholas Hopper},
  title        = {DefenestraTor: Throwing Out Windows in Tor},
  booktitle    = {Privacy Enhancing Technologies - 11th International Symposium, {PETS}
                  2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6794},
  pages        = {134--154},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22263-4\_8},
  doi          = {10.1007/978-3-642-22263-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/AlSabahBGGMSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BauerSG11,
  author       = {Kevin S. Bauer and
                  Micah Sherr and
                  Dirk Grunwald},
  editor       = {Sean Peisert and
                  Stephen Schwab},
  title        = {ExperimenTor: {A} Testbed for Safe and Realistic Tor Experimentation},
  booktitle    = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11,
                  San Francisco, CA, USA, August 8, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/cset11/experimentor-testbed-safe-and-realistic-tor-experimentation},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BauerSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/GonzalesBLMS10,
  author       = {Harold Gonzales and
                  Kevin S. Bauer and
                  Janne Lindqvist and
                  Damon McCoy and
                  Douglas C. Sicker},
  title        = {Practical Defenses for Evil Twin Attacks in 802.11},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5684213},
  doi          = {10.1109/GLOCOM.2010.5684213},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/GonzalesBLMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/BauerMABGGS09,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Eric W. Anderson and
                  Markus Breitenbach and
                  Gregory Z. Grudic and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  title        = {The Directional Attack on Wireless Localization -or- How to Spoof
                  Your Location with a Tin Can},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5425737},
  doi          = {10.1109/GLOCOM.2009.5425737},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/BauerMABGGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/BauerGS09,
  author       = {Kevin S. Bauer and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  title        = {Predicting Tor path compromise by exit port},
  booktitle    = {28th International Performance Computing and Communications Conference,
                  {IPCCC} 2009, 14-16 December 2009, Phoenix, Arizona, {USA}},
  pages        = {384--387},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/PCCC.2009.5403852},
  doi          = {10.1109/PCCC.2009.5403852},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/BauerGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/AndersonPGBSG09,
  author       = {Eric Anderson and
                  Caleb T. Phillips and
                  Harold Gonzales and
                  Kevin S. Bauer and
                  Douglas C. Sicker and
                  Dirk Grunwald},
  editor       = {Xiaoming Fu and
                  Pan Hui},
  title        = {SniffMob: inferring human contact patterns using wireless devices},
  booktitle    = {Proceedings of the 1st {ACM} International Workshop on Hot Topics
                  of Planet-Scale Mobility Measurements, HotPlanet@MobiSys 2009, Wroclaw,
                  Poland, June 22-25, 2009},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1651428.1651434},
  doi          = {10.1145/1651428.1651434},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/AndersonPGBSG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/BauerMGGS09,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Ben Greenstein and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  editor       = {Ian Goldberg and
                  Mikhail J. Atallah},
  title        = {Physical Layer Attacks on Unlinkability in Wireless LANs},
  booktitle    = {Privacy Enhancing Technologies, 9th International Symposium, {PETS}
                  2009, Seattle, WA, USA, August 5-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5672},
  pages        = {108--127},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03168-7\_7},
  doi          = {10.1007/978-3-642-03168-7\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pet/BauerMGGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapia/BauerMGGS09,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Ben Greenstein and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  editor       = {Nina M. Berry},
  title        = {Performing traffic analysis on a wireless identifier-free link layer},
  booktitle    = {Proceedings of the Richard Tapia Celebration of Diversity in Computing
                  Conference 2009: Intellect, Initiatives, Insight, and Innovations,
                  Portland, Oregon, USA, April 1-4, 2009},
  pages        = {18--23},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1565799.1565804},
  doi          = {10.1145/1565799.1565804},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tapia/BauerMGGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BauerMGS09,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  title        = {BitStalker: Accurately and efficiently monitoring bittorrent traffic},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {181--185},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386457},
  doi          = {10.1109/WIFS.2009.5386457},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BauerMGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/BauerGM08,
  author       = {Kevin S. Bauer and
                  Harold Gonzales and
                  Damon McCoy},
  editor       = {Ty Znati and
                  Youtao Zhang},
  title        = {Mitigating Evil Twin Attacks in 802.11},
  booktitle    = {2008 {IEEE} International Performance, Computing and Communications
                  Conference, {IPCCC} 2008, Austin, TX, USA, December 7-9, 2008},
  pages        = {513--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PCCC.2008.4745081},
  doi          = {10.1109/PCCC.2008.4745081},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/BauerGM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/McCoyBGKS08,
  author       = {Damon McCoy and
                  Kevin S. Bauer and
                  Dirk Grunwald and
                  Tadayoshi Kohno and
                  Douglas C. Sicker},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {Shining Light in Dark Places: Understanding the Tor Network},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {63--76},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_5},
  doi          = {10.1007/978-3-540-70630-4\_5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pet/McCoyBGKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BauerMGS08,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {BitBlender: Light-Weight Anonymity for BitTorrent},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1461464.1461465},
  doi          = {10.1145/1461464.1461465},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/BauerMGS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/AndersonPBGS08,
  author       = {Eric W. Anderson and
                  Caleb T. Phillips and
                  Kevin S. Bauer and
                  Dirk Grunwald and
                  Douglas C. Sicker},
  editor       = {Zhen Liu and
                  Vishal Misra and
                  Prashant J. Shenoy},
  title        = {Modeling directionality in wireless networks: extended abstract},
  booktitle    = {Proceedings of the 2008 {ACM} {SIGMETRICS} International Conference
                  on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2008,
                  Annapolis, MD, USA, June 2-6, 2008},
  pages        = {443--444},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375457.1375512},
  doi          = {10.1145/1375457.1375512},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/AndersonPBGS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BauerMGKS07,
  author       = {Kevin S. Bauer and
                  Damon McCoy and
                  Dirk Grunwald and
                  Tadayoshi Kohno and
                  Douglas C. Sicker},
  editor       = {Peng Ning and
                  Ting Yu},
  title        = {Low-resource routing attacks against tor},
  booktitle    = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314333.1314336},
  doi          = {10.1145/1314333.1314336},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/BauerMGKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics