Stephen Herwig

According to our database1, Stephen Herwig authored at least 7 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards Protecting Billions and Billions of Bits on the Interplanetary Internet.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023

2021
Execution Environments for Running Legacy Applications in Multi-Party Trust Settings.
PhD thesis, 2021

Bento: safely bringing network function virtualization to Tor.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

2020
Achieving Keyless CDNs with Conclaves.
Proceedings of the 29th USENIX Security Symposium, 2020

Bento: Bringing Network Function Virtualization to Tor.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2017
DeTor: Provably Avoiding Geographic Regions in Tor.
Proceedings of the 26th USENIX Security Symposium, 2017


  Loading...