Bobtail: Improved Blockchain Security with Low-Variance Mining | 0 | 0.34 | 2020 |
A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet | 0 | 0.34 | 2020 |
Re-identification of Mobile Devices using Real-Time Bidding Advertising Networks | 0 | 0.34 | 2020 |
Protecting location privacy from untrusted wireless service providers | 0 | 0.34 | 2020 |
Graphene - efficient interactive set reconciliation applied to blockchain propagation. | 3 | 0.50 | 2019 |
Bonded Mining: Difficulty Adjustment By Miner Commitment | 0 | 0.34 | 2019 |
Server-side traffic analysis reveals mobile location information over the Internet | 0 | 0.34 | 2019 |
MicroMobile: Leveraging Mobile Advertising for Large-Scale Experimentation. | 1 | 0.39 | 2018 |
Statistical Detection of Downloaders in Freenet. | 0 | 0.34 | 2017 |
Graphene: A New Protocol For Block Propagation Using Set Reconciliation | 3 | 0.41 | 2017 |
Securing the Assets of Decentralized Applications using Financial Derivatives (DRAFT). | 0 | 0.34 | 2017 |
Advertising-based Measurement: A Platform of 7 Billion Mobile Devices. | 4 | 0.42 | 2017 |
Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance (Draft). | 0 | 0.34 | 2017 |
An Explanation of Nakamoto's Analysis of Double-spend Attacks. | 1 | 0.37 | 2017 |
Forensic Identification of Anonymous Sources in OneSwarm. | 0 | 0.34 | 2017 |
Estimation of Miner Hash Rates and Consensus on Blockchains (draft). | 0 | 0.34 | 2017 |
Market-based Security for Distributed Applications. | 0 | 0.34 | 2017 |
An Analysis of Attacks on Blockchain Consensus. | 1 | 0.39 | 2016 |
Discovering specification violations in networked software systems | 5 | 0.37 | 2015 |
Sybil-Resistant Mixing for Bitcoin. | 28 | 1.57 | 2014 |
Efficient Smart Phone Forensics Based on Relevance Feedback | 1 | 0.36 | 2014 |
Efficient Tagging of Remote Peers during Child Pornography Investigations | 0 | 0.34 | 2014 |
Disambiguation of residential wired and wireless access in a forensic setting | 6 | 0.58 | 2013 |
Fighting internet-based sexual exploitation crimes against children | 0 | 0.34 | 2013 |
Measurement and analysis of child pornography trafficking on P2P networks | 10 | 0.56 | 2013 |
Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet. | 0 | 0.34 | 2013 |
Functional privacy or why cookies are better with milk | 3 | 0.46 | 2012 |
Forensic triage for mobile phones with DEC0DE | 18 | 1.36 | 2011 |
Low spreading loss in underwater acoustic networks reduces RTS/CTS effectiveness | 1 | 0.46 | 2011 |
Effective digital forensics research is investigator-centric | 9 | 0.59 | 2011 |
Empirical tests of anonymous voice over IP | 4 | 0.46 | 2011 |
Spider: improving mobile networking with concurrent wi-fi connections | 16 | 0.97 | 2011 |
A retrospective look at the UMass DOME mobile testbed | 4 | 0.42 | 2011 |
Forensic investigation of the OneSwarm anonymous filesharing system | 6 | 0.50 | 2011 |
Concurrent Wi-Fi for mobile users: analysis and measurements | 19 | 0.83 | 2011 |
Economic incentives for protecting digital rights online | 1 | 0.41 | 2011 |
Strengthening forensic investigations of child pornography on P2P networks | 10 | 0.53 | 2010 |
Reverse engineering for mobile systems forensics with Ares | 2 | 0.43 | 2010 |
Replication routing in DTNs: a resource allocation approach | 91 | 2.70 | 2010 |
Assessing the vulnerability of replicated network services | 1 | 0.36 | 2010 |
Forensic investigation of peer-to-peer file sharing networks | 15 | 0.90 | 2010 |
Design and Field Experimentation of an Energy-Efficient Architecture for DTN Throwboxes | 58 | 1.76 | 2010 |
DOME: a diverse outdoor mobile testbed | 24 | 2.67 | 2009 |
DEX: Digital evidence provenance supporting reproducibility and comparison | 11 | 1.05 | 2009 |
Enhancing interactive web applications in hybrid networks | 45 | 3.54 | 2008 |
Quantifying Resistance to the Sybil Attack | 9 | 0.69 | 2008 |
Relays, base stations, and meshes: enhancing mobile networks with infrastructure | 120 | 5.28 | 2008 |
Passive logging attacks against anonymous communications systems | 9 | 0.51 | 2008 |
Interactive wifi connectivity for moving vehicles | 113 | 5.95 | 2008 |
Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing | 240 | 12.37 | 2007 |