Nicholas J. Hopper
Affiliations: | Computer Science | University of Minnesota, Twin Cities, Minneapolis, MN |
Area:
Computer Science, Speech CommunicationGoogle:
"Nicholas Hopper"Children
Sign in to add traineeJames K. Holland | grad student | UMN | |
Hun J. Kang | grad student | 2010 | UMN |
Eugene Y. Vasserman | grad student | 2010 | UMN |
D. E. Chan-Tin | grad student | 2011 | UMN |
Zi Lin | grad student | 2012 | UMN |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Chan-Tin E, Heorhiadi V, Hopper N, et al. (2015) Hijacking the Vuze BitTorrent network: All your hop are belong to us Iet Information Security. 9: 203-208 |
Vasserman EY, Hopper N. (2013) Vampire attacks: Draining life from wireless ad Hoc sensor networks Ieee Transactions On Mobile Computing. 12: 318-332 |
Wang P, Tyra J, Chan-Tin E, et al. (2013) Attacking the kad network-real world evaluation and high fidelity simulation using DVN Security and Communication Networks. 6: 1556-1575 |
Chan-Tin E, Heorhiadi V, Hopper N, et al. (2011) The Frog-Boiling attack: Limitations of secure network coordinate systems Acm Transactions On Information and System Security. 14 |
Hopper N, Vasserman EY, Chan-Tin E. (2010) How much anonymity does network latency leak? Acm Transactions On Information and System Security. 13 |
Hopper N, Ahn Lv, Langford J. (2009) Provably Secure Steganography Ieee Transactions On Computers. 58: 662-676 |
Kang HJ, Chan-Tin E, Hopper NJ, et al. (2009) Why kad lookup fails Ieee P2p'09 - 9th International Conference On Peer-to-Peer Computing. 121-130 |
Cheon JH, Hopper N, Kim Y, et al. (2008) Provably Secure Timed-Release Public Key Encryption Acm Transactions On Information and System Security. 11: 4 |
Vasserman EY, Hopper N, Laxson J, et al. (2007) SilenTknock: Practical, provably undetectable authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4734: 122-138 |
Von Ahn L, Hopper NJ. (2004) Public-key steganography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3027: 323-341 |