Nicholas J. Hopper

Affiliations: 
Computer Science University of Minnesota, Twin Cities, Minneapolis, MN 
Area:
Computer Science, Speech Communication
Google:
"Nicholas Hopper"

Children

Sign in to add trainee
James K. Holland grad student UMN
Hun J. Kang grad student 2010 UMN
Eugene Y. Vasserman grad student 2010 UMN
D. E. Chan-Tin grad student 2011 UMN
Zi Lin grad student 2012 UMN
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Chan-Tin E, Heorhiadi V, Hopper N, et al. (2015) Hijacking the Vuze BitTorrent network: All your hop are belong to us Iet Information Security. 9: 203-208
Vasserman EY, Hopper N. (2013) Vampire attacks: Draining life from wireless ad Hoc sensor networks Ieee Transactions On Mobile Computing. 12: 318-332
Wang P, Tyra J, Chan-Tin E, et al. (2013) Attacking the kad network-real world evaluation and high fidelity simulation using DVN Security and Communication Networks. 6: 1556-1575
Chan-Tin E, Heorhiadi V, Hopper N, et al. (2011) The Frog-Boiling attack: Limitations of secure network coordinate systems Acm Transactions On Information and System Security. 14
Hopper N, Vasserman EY, Chan-Tin E. (2010) How much anonymity does network latency leak? Acm Transactions On Information and System Security. 13
Hopper N, Ahn Lv, Langford J. (2009) Provably Secure Steganography Ieee Transactions On Computers. 58: 662-676
Kang HJ, Chan-Tin E, Hopper NJ, et al. (2009) Why kad lookup fails Ieee P2p'09 - 9th International Conference On Peer-to-Peer Computing. 121-130
Cheon JH, Hopper N, Kim Y, et al. (2008) Provably Secure Timed-Release Public Key Encryption Acm Transactions On Information and System Security. 11: 4
Vasserman EY, Hopper N, Laxson J, et al. (2007) SilenTknock: Practical, provably undetectable authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4734: 122-138
Von Ahn L, Hopper NJ. (2004) Public-key steganography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3027: 323-341
See more...