Brian Neil Levine

Orcid: 0000-0003-2262-0617

Affiliations:
  • University of Massachusetts Amherst, USA


According to our database1, Brian Neil Levine authored at least 104 papers between 1996 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Pricing Security in Proof-of-Work Systems.
CoRR, 2020

ZipPhone: Protecting user location privacy from cellular service providers.
CoRR, 2020

Protecting location privacy from untrusted wireless service providers.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Bobtail: Improved Blockchain Security with Low-Variance Mining.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Re-identification of mobile devices using real-time bidding advertising networks.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Server-Side Traffic Analysis Reveals Mobile Location Information over the Internet.
IEEE Trans. Mob. Comput., 2019

Greedy but Cautious: Conditions for Miner Convergence to Resource Allocation Equilibrium.
CoRR, 2019

Graphene: efficient interactive set reconciliation applied to blockchain propagation.
Proceedings of the ACM Special Interest Group on Data Communication, 2019

Bonded Mining: Difficulty Adjustment by Miner Commitment.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

2018
Auditing and Forensic Analysis.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

MicroMobile: Leveraging Mobile Advertising for Large-Scale Experimentation.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
Forensic Identification of Anonymous Sources in OneSwarm.
IEEE Trans. Dependable Secur. Comput., 2017

Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance (Draft).
CoRR, 2017

An Explanation of Nakamoto's Analysis of Double-spend Attacks.
CoRR, 2017

Estimation of Miner Hash Rates and Consensus on Blockchains (draft).
CoRR, 2017

Securing the Assets of Decentralized Applications using Financial Derivatives (DRAFT).
CoRR, 2017

Statistical Detection of Downloaders in Freenet.
Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th IEEE Symposium on Security and Privacy, 2017

Market-based Security for Distributed Applications.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

Advertising-based Measurement: A Platform of 7 Billion Mobile Devices.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Graphene: A New Protocol for Block Propagation Using Set Reconciliation.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
An Analysis of Attacks on Blockchain Consensus.
CoRR, 2016

2015
Discovering specification violations in networked software systems.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

2014
Efficient Tagging of Remote Peers during Child Pornography Investigations.
IEEE Trans. Dependable Secur. Comput., 2014

Sybil-Resistant Mixing for Bitcoin.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Efficient Smart Phone Forensics Based on Relevance Feedback.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

2013
Measurement and analysis of child pornography trafficking on P2P networks.
Proceedings of the 22nd International World Wide Web Conference, 2013

Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Disambiguation of residential wired and wireless access in a forensic setting.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Functional Privacy or Why Cookies Are Better with Milk.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

2011
A retrospective look at the UMass DOME mobile testbed.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Empirical tests of anonymous voice over IP.
J. Netw. Comput. Appl., 2011

Economic incentives for protecting digital rights online.
Electron. Commer. Res. Appl., 2011

Low spreading loss in underwater acoustic networks reduces RTS/CTS effectiveness.
Proceedings of the Sixth ACM International Workshop on Underwater Networks, 2011

Effective Digital Forensics Research Is Investigator-Centric.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Forensic Triage for Mobile Phones with DEC0DE.
Proceedings of the 20th USENIX Security Symposium, 2011

Spider: improving mobile networking with concurrent wi-fi connections.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Concurrent Wi-Fi for mobile users: analysis and measurements.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

Forensic investigation of the OneSwarm anonymous filesharing system.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Design and field experimentation of an energy-efficient architecture for DTN throwboxes.
IEEE/ACM Trans. Netw., 2010

Replication routing in DTNs: a resource allocation approach.
IEEE/ACM Trans. Netw., 2010

Forensic investigation of peer-to-peer file sharing networks.
Digit. Investig., 2010

Strengthening forensic investigations of child pornography on P2P networks.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

Assessing the vulnerability of replicated network services.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

Reverse engineering for mobile systems forensics with Ares.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010

2009
Auditing and Forensic Analysis.
Proceedings of the Encyclopedia of Database Systems, 2009

DEX: Digital evidence provenance supporting reproducibility and comparison.
Digit. Investig., 2009

DOME: a diverse outdoor mobile testbed.
Proceedings of the 1st ACM International Workshop on Hot Topics of Planet-Scale Mobility Measurements, 2009

2008
Passive-Logging Attacks Against Anonymous Communications Systems.
ACM Trans. Inf. Syst. Secur., 2008

MORA routing and capacity building in disruption-tolerant networks.
Ad Hoc Networks, 2008

Interactive wifi connectivity for moving vehicles.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Relays, base stations, and meshes: enhancing mobile networks with infrastructure.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Enhancing interactive web applications in hybrid networks.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Quantifying Resistance to the Sybil Attack.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2007
Cheat-proof playout for centralized and peer-to-peer gaming.
IEEE/ACM Trans. Netw., 2007

Threats to privacy in the forensic analysis of database systems.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007

Bounding damage from link destruction, with application to the internet.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

DTN routing as a resource allocation problem.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

Surviving attacks on disruption-tolerant networks without authentication.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

Web search from a bus.
Proceedings of the Second Workshop on Challenged Networks, CHANTS 2007, Montréal, Québec, 2007

An Energy-Efficient Architecture for DTN Throwboxes.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Informant: Detecting Sybils Using Incentives.
Proceedings of the Financial Cryptography and Data Security, 2007

Securing history: Privacy and accountability in database systems.
Proceedings of the Third Biennial Conference on Innovative Data Systems Research, 2007

2006
Internet security.
Comput. Commun., 2006

Detecting the Sybil Attack in Mobile Ad hoc Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

A survey of practical issues in underwater networks.
Proceedings of the First Workshop on Underwater Networks, WUWNET 2006, Los Angeles, CA, 2006

Capacity Enhancement using Throwboxes in DTNs.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Autonomous Enhancement of Disruption Tolerant Networks.
Proceedings of the 2006 IEEE International Conference on Robotics and Automation, 2006

Maximizing transfer opportunities in bluetooth DTNs.
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006

Inferring the source of encrypted HTTP connections.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Authenticated routing for ad hoc networks.
IEEE J. Sel. Areas Commun., 2005

Privacy Vulnerabilities in Encrypted HTTP Streams.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Supporting P2P gaming when players have heterogeneous resources.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2005

Creating social networks to improve peer-to-peer networking.
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005

MV routing and capacity building in disruption tolerant networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

On the cost-ineffectiveness of redundancy in commercial P2P computing.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
The predecessor attack: An analysis of a threat to anonymous communications systems.
ACM Trans. Inf. Syst. Secur., 2004

An evaluation of chord using traces of peer-to-peer file sharing.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

Timing Attacks in Low-Latency Mix Systems (Extended Abstract).
Proceedings of the Financial Cryptography, 2004

Analysis of an incentives-based secrets protection system.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

A Multi-Agent Approach for Peer-to-Peer Based Information Retrieval System.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

2003
Organizing multicast receivers deterministically by packet-loss correlation.
Multim. Syst., 2003

Defending Anonymous Communications Against Passive Logging Attack.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Adaptive Peer Selection.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003

Mobile Distributed Information Retrieval for Highly-Partitioned Networks.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

2002
Guest editorial - network support for multicast communications.
IEEE J. Sel. Areas Commun., 2002

Hordes: a Multicast-Based Protocol for Anonymity.
J. Comput. Secur., 2002

An Analysis of the Degradation of Anonymous Protocols.
Proceedings of the Network and Distributed System Security Symposium, 2002

A Secure Routing Protocol for Ad Hoc Networks.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002

2001
Wearable Computers as Packet Transport Mechanisms in Highly-Partitioned Ad-Hoc Networks.
Proceedings of the 5th International Symposium on Wearable Computers (ISWC 2001), 2001

Cheat-proof Playout for Centralized and Distributed Online Games.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

Responder Anonymity and Anonymous Peer-to-Peer File Sharing.
Proceedings of the 9th International Conference on Network Protocols (ICNP 2001), 2001

Evaluation of a Novel Two-Step Server Selection Metric.
Proceedings of the 9th International Conference on Network Protocols (ICNP 2001), 2001

2000
Deployment issues for the IP multicast service and architecture.
IEEE Netw., 2000

A hierarchical multicast monitoring scheme.
Proceedings of the Networked Group Communication, 2000

Consideration of Receiver Interest for IP Multicast Delivery.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

A protocol for anonymous communication over the Internet.
Proceedings of the CCS 2000, 2000

1998
A Comparison of Reliable Multicast Protocols.
Multim. Syst., 1998

1997
Improving Internet multicast with routing labels.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997

1996
The Case for Reliable Concurrent Multicasting Using Shared Ack Trees.
Proceedings of the Forth ACM International Conference on Multimedia '96, 1996

A Comparison of Known Classes of Reliable Multicast Protocols.
Proceedings of the 1996 International Conference on Network Protocols, 1996


  Loading...