Year |
Citation |
Score |
2017 |
Zhang Y, O'Neill A, Sherr M, Zhou W. Privacy-preserving network provenance Proceedings of the Vldb Endowment. 10: 1550-1561. DOI: 10.14778/3137628.3137661 |
0.367 |
|
2016 |
Tan H, Sherr M, Zhou W. Data-plane Defenses against Routing Attacks on Tor Proceedings On Privacy Enhancing Technologies. 2016: 276-293. DOI: 10.1515/popets-2016-0040 |
0.403 |
|
2016 |
Zhao M, Zhou W, Gurney AJT, Haeberlen A, Sherr M, Loo BT. Private and verifiable interdomain routing decisions Ieee/Acm Transactions On Networking. 24: 1011-1024. DOI: 10.1109/Tnet.2015.2409233 |
0.671 |
|
2015 |
Bates A, Butler KRB, Sherr M, Shields C, Traynor P, Wallach D. Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195. DOI: 10.3233/Jcs-140515 |
0.447 |
|
2015 |
Brad Moore W, Tan H, Sherr M, Maloof MA. Multi-class traffic morphing for encrypted VoIP communication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8975: 65-85. DOI: 10.1007/978-3-662-47854-7_5 |
0.332 |
|
2014 |
Sherr M, Gill H, Saeed TA, Mao A, Marczak WR, Soundararajan S, Zhou W, Loo BT, Blaze M. The design and implementation of the A3 application-aware anonymity platform Computer Networks. 58: 206-227. DOI: 10.1016/J.Comnet.2013.09.021 |
0.625 |
|
2014 |
Aviv AJ, Blaze M, Sherr M, Smith JM. Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43. DOI: 10.1016/J.Comcom.2014.03.013 |
0.519 |
|
2014 |
Tan H, Wacek C, Newport C, Sherr M. A disruption-resistant MAC layer for multichannel wireless networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8878: 202-216. |
0.415 |
|
2013 |
Johnson A, Wacek C, Jansen R, Sherr M, Syverson P. Users get routed: Traffic correlation on Tor by realistic adversaries Proceedings of the Acm Conference On Computer and Communications Security. 337-348. DOI: 10.1145/2508859.2516651 |
0.408 |
|
2012 |
Aviv AJ, Sherr M, Blaze M, Smith JM. Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198. DOI: 10.1007/978-3-642-33167-1_11 |
0.443 |
|
2012 |
Loo BT, Gill H, Liu C, Mao Y, Marczak WR, Sherr M, Wang A, Zhou W. Recent advances in declarative networking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7149: 1-16. DOI: 10.1007/978-3-642-27694-1_1 |
0.67 |
|
2012 |
Zhou W, Mapara S, Ren Y, Li Y, Haeberlen A, Ives Z, Loo BT, Sherr M. Distributed time-aware provenance Proceedings of the Vldb Endowment. 6: 49-60. |
0.616 |
|
2011 |
Moore WB, Wacek C, Sherr M. Exploring the potential benefits of expanded rate limiting in Tor: Slow and steady wins the race with Tortoise Acm International Conference Proceeding Series. 207-216. DOI: 10.1145/2076732.2076762 |
0.317 |
|
2011 |
Gurney AJT, Haeberlen A, Zhou W, Sherr M, Loo BT. Having your cake and eating it too: Routing security with privacy protections Proceedings of the 10th Acm Workshop On Hot Topics in Networks, Hotnets-10. DOI: 10.1145/2070562.2070577 |
0.637 |
|
2011 |
Zhou W, Fei Q, Narayan A, Haeberlen A, Loo BT, Sherr M. Secure network provenance Sosp'11 - Proceedings of the 23rd Acm Symposium On Operating Systems Principles. 295-310. DOI: 10.1145/2043556.2043584 |
0.639 |
|
2011 |
Zhou W, Fei Q, Sun S, Tao T, Haeberlen A, Ives Z, Loo BT, Sherr M. NetTrails: A declarative platform for maintaining and querying provenance in distributed systems Proceedings of the Acm Sigmod International Conference On Management of Data. 1323-1325. DOI: 10.1145/1989323.1989488 |
0.671 |
|
2010 |
Zhou W, Sherr M, Marczak WR, Zhang Z, Tao T, Loo BT, Lee I. Towards a data-centric view of cloud security International Conference On Information and Knowledge Management, Proceedings. 25-32. DOI: 10.1145/1871929.1871934 |
0.612 |
|
2010 |
Marczak WR, Huang SS, Bravenboer M, Sherr M, Loo BT, Aref M. SecureBlox: Customizable secure distributed data processing Proceedings of the Acm Sigmod International Conference On Management of Data. 723-734. DOI: 10.1145/1807167.1807246 |
0.653 |
|
2010 |
Zhou W, Sherr M, Tao T, Li X, Loo BT, Mao Y. Efficient querying and maintenance of network provenance at internet-scale Proceedings of the Acm Sigmod International Conference On Management of Data. 615-626. DOI: 10.1145/1807167.1807234 |
0.599 |
|
2009 |
Sherr M, Shah G, Cronin E, Clark S, Blaze M. Can they hear me now? A security analysis of law enforcement wiretaps Proceedings of the Acm Conference On Computer and Communications Security. 512-523. DOI: 10.1145/1653662.1653724 |
0.383 |
|
2009 |
Sherr M, Blaze M, Loo BT. Scalable link-based relay selection for anonymous routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 73-93. DOI: 10.1007/978-3-642-03168-7_5 |
0.564 |
|
2008 |
Cronin E, Sherr M, Blaze M. On the (un)reliability of eavesdropping International Journal of Security and Networks. 3: 103. DOI: 10.1504/Ijsn.2008.017223 |
0.315 |
|
2006 |
Cronin E, Sherr M, Blaze M. On the reliability of network eavesdropping tools Ifip International Federation For Information Processing. 222: 199-213. |
0.325 |
|
Show low-probability matches. |