John Geddes

According to our database1, John Geddes authored at least 11 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
KIST: Kernel-Informed Socket Transport for Tor.
ACM Trans. Priv. Secur., 2019

2018
A contextualized, experiential learning approach to quantitative engineering analysis.
Proceedings of the IEEE Frontiers in Education Conference, 2018

The student experience in an integrative, project-based course on quantitative engineering analysis.
Proceedings of the IEEE Frontiers in Education Conference, 2018

2016
Anarchy in Tor: Performance Cost of Decentralization.
CoRR, 2016

ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding Bottlenecks.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

The Cost of the Path Not Taken.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2014
IMUX: Managing Tor Connections from Two to Infinity, and Beyond.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
How Low Can You Go: Balancing Performance with Anonymity in Tor.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Cover your ACKs: pitfalls of covert channel censorship circumvention.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Routing around decoys.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...