Micah Sherr, Ph.D.
Affiliations: | 2009 | University of Pennsylvania, Philadelphia, PA, United States |
Area:
Information Systems: Databases and Data ManagementGoogle:
"Micah Sherr"Parents
Sign in to add mentorBoon Thau Loo | grad student | 2009 | Penn | |
(Coordinate-based routing for high performance anonymity.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Zhang Y, O'Neill A, Sherr M, et al. (2017) Privacy-preserving network provenance Proceedings of the Vldb Endowment. 10: 1550-1561 |
Tan H, Sherr M, Zhou W. (2016) Data-plane Defenses against Routing Attacks on Tor Proceedings On Privacy Enhancing Technologies. 2016: 276-293 |
Zhao M, Zhou W, Gurney AJT, et al. (2016) Private and verifiable interdomain routing decisions Ieee/Acm Transactions On Networking. 24: 1011-1024 |
Bates A, Butler KRB, Sherr M, et al. (2015) Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195 |
Brad Moore W, Tan H, Sherr M, et al. (2015) Multi-class traffic morphing for encrypted VoIP communication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8975: 65-85 |
Sherr M, Gill H, Saeed TA, et al. (2014) The design and implementation of the A3 application-aware anonymity platform Computer Networks. 58: 206-227 |
Aviv AJ, Blaze M, Sherr M, et al. (2014) Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43 |
Tan H, Wacek C, Newport C, et al. (2014) A disruption-resistant MAC layer for multichannel wireless networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8878: 202-216 |
Johnson A, Wacek C, Jansen R, et al. (2013) Users get routed: Traffic correlation on Tor by realistic adversaries Proceedings of the Acm Conference On Computer and Communications Security. 337-348 |
Aviv AJ, Sherr M, Blaze M, et al. (2012) Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198 |