Name
Papers
Collaborators
BRIAN LEVINE
95
110
Citations 
PageRank 
Referers 
4635
355.81
7745
Referees 
References 
1834
1405
Search Limit
1001000
Title
Citations
PageRank
Year
Bobtail: Improved Blockchain Security with Low-Variance Mining00.342020
A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet00.342020
Re-identification of Mobile Devices using Real-Time Bidding Advertising Networks00.342020
Protecting location privacy from untrusted wireless service providers00.342020
Graphene - efficient interactive set reconciliation applied to blockchain propagation.30.502019
Bonded Mining: Difficulty Adjustment By Miner Commitment00.342019
Server-side traffic analysis reveals mobile location information over the Internet00.342019
MicroMobile: Leveraging Mobile Advertising for Large-Scale Experimentation.10.392018
Statistical Detection of Downloaders in Freenet.00.342017
Graphene: A New Protocol For Block Propagation Using Set Reconciliation30.412017
Securing the Assets of Decentralized Applications using Financial Derivatives (DRAFT).00.342017
Advertising-based Measurement: A Platform of 7 Billion Mobile Devices.40.422017
Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance (Draft).00.342017
An Explanation of Nakamoto's Analysis of Double-spend Attacks.10.372017
Forensic Identification of Anonymous Sources in OneSwarm.00.342017
Estimation of Miner Hash Rates and Consensus on Blockchains (draft).00.342017
Market-based Security for Distributed Applications.00.342017
An Analysis of Attacks on Blockchain Consensus.10.392016
Discovering specification violations in networked software systems50.372015
Sybil-Resistant Mixing for Bitcoin.281.572014
Efficient Smart Phone Forensics Based on Relevance Feedback10.362014
Efficient Tagging of Remote Peers during Child Pornography Investigations00.342014
Disambiguation of residential wired and wireless access in a forensic setting60.582013
Fighting internet-based sexual exploitation crimes against children00.342013
Measurement and analysis of child pornography trafficking on P2P networks100.562013
Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet.00.342013
Functional privacy or why cookies are better with milk30.462012
Forensic triage for mobile phones with DEC0DE181.362011
Low spreading loss in underwater acoustic networks reduces RTS/CTS effectiveness10.462011
Effective digital forensics research is investigator-centric90.592011
Empirical tests of anonymous voice over IP40.462011
Spider: improving mobile networking with concurrent wi-fi connections160.972011
A retrospective look at the UMass DOME mobile testbed40.422011
Forensic investigation of the OneSwarm anonymous filesharing system60.502011
Concurrent Wi-Fi for mobile users: analysis and measurements190.832011
Economic incentives for protecting digital rights online10.412011
Strengthening forensic investigations of child pornography on P2P networks100.532010
Reverse engineering for mobile systems forensics with Ares20.432010
Replication routing in DTNs: a resource allocation approach912.702010
Assessing the vulnerability of replicated network services10.362010
Forensic investigation of peer-to-peer file sharing networks150.902010
Design and Field Experimentation of an Energy-Efficient Architecture for DTN Throwboxes581.762010
DOME: a diverse outdoor mobile testbed242.672009
DEX: Digital evidence provenance supporting reproducibility and comparison111.052009
Enhancing interactive web applications in hybrid networks453.542008
Quantifying Resistance to the Sybil Attack90.692008
Relays, base stations, and meshes: enhancing mobile networks with infrastructure1205.282008
Passive logging attacks against anonymous communications systems90.512008
Interactive wifi connectivity for moving vehicles1135.952008
Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing24012.372007
  • 1
  • 2