Volgen
Kevin P. Dyer
Kevin P. Dyer
Geverifieerd e-mailadres voor google.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
IEEE Symposium on Security and Privacy 2012, 2012
5952012
Protocol misidentification made easy with format-transforming encryption
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1702013
Marionette: A programmable network traffic obfuscation system
KP Dyer, SE Coull, T Shrimpton
24th USENIX Security Symposium (USENIX Security 15), 367-382, 2015
160*2015
Traffic analysis of encrypted messaging services: Apple imessage and beyond
SE Coull, KP Dyer
ACM SIGCOMM Computer Communication Review 44 (5), 5-11, 2014
1392014
Seeing through network-protocol obfuscation
L Wang, KP Dyer, A Akella, T Ristenpart, T Shrimpton
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1252015
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
D Luchaup, KP Dyer, S Jha, T Ristenpart, T Shrimpton
USENIX Security 2014, 2014
412014
Novel Cryptographic Primitives and Protocols for Censorship Resistance
KP Dyer
Portland State University, 2015
2015
Cryptanalysis of the SHA Family of Hash Functions
KP Dyer
Royal Holloway, University of London, 2007
2007
Linear cryptanalysis of two round 16 step MD5 over the rationals
KP Dyer, EF Schaefer
Southern Africa Mathematical Sciences Association, 2005, 2005
2005
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–9