Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
CAPTCHA: Using Hard AI Problems for Security
- L. V. Ahn, M. Blum, N. Hopper, J. Langford
- Computer Science
- EUROCRYPT
- 4 May 2003
TLDR
Secure Human Identification Protocols
TLDR
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
- Rob Jansen, N. Hopper
- Computer Science
- NDSS
- 23 September 2011
TLDR
Analysis of genetic diversity through population history
TLDR
- 132
- 17
- PDF
How much anonymity does network latency leak?
- N. Hopper, E. Vasserman, Eric Chan-Tin
- Computer Science
- ACM Trans. Inf. Syst. Secur.
- 1 February 2010
TLDR
k-anonymous message transmission
TLDR
Scalable onion routing with torsk
- Jon McLachlan, Andrew Tran, N. Hopper, Y. Kim
- Computer Science
- CCS
- 9 November 2009
TLDR
Routing around decoys
- Max Schuchard, J. Geddes, C. Thompson, N. Hopper
- Computer Science
- CCS
- 16 October 2012
TLDR
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
- E. Vasserman, N. Hopper
- Computer Science
- IEEE Transactions on Mobile Computing
- 1 February 2013
TLDR
Keep your friends close: Incorporating trust into social network-based Sybil defenses
- Aziz Mohaisen, N. Hopper, Y. Kim
- Computer Science
- Proceedings IEEE INFOCOM
- 1 April 2011
TLDR