Kevin S. Bauer

According to our database1, Kevin S. Bauer authored at least 20 papers between 2007 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

An Empirical Evaluation of Relay Selection in Tor.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Changing of the guards: a framework for understanding and improving entry guard selection in tor.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Methodically Modeling the Tor Network.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

Congestion-Aware Path Selection for Tor.
Proceedings of the Financial Cryptography and Data Security, 2012

Enhancing Tor's performance using real-time traffic classification.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

DefenestraTor: Throwing Out Windows in Tor.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

2010
Practical Defenses for Evil Twin Attacks in 802.11.
Proceedings of the Global Communications Conference, 2010

2009
BitStalker: Accurately and efficiently monitoring bittorrent traffic.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Performing traffic analysis on a wireless identifier-free link layer.
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, 2009

Physical Layer Attacks on Unlinkability in Wireless LANs.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

SniffMob: inferring human contact patterns using wireless devices.
Proceedings of the 1st ACM International Workshop on Hot Topics of Planet-Scale Mobility Measurements, 2009

Predicting Tor path compromise by exit port.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Modeling directionality in wireless networks: extended abstract.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

BitBlender: Light-Weight Anonymity for BitTorrent.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Shining Light in Dark Places: Understanding the Tor Network.
Proceedings of the Privacy Enhancing Technologies, 2008

Mitigating Evil Twin Attacks in 802.11.
Proceedings of the 2008 IEEE International Performance, 2008

2007
Low-resource routing attacks against tor.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007


  Loading...