BibTeX records: Eric Chan-Tin

download as .bib file

@inproceedings{DBLP:conf/acisp/MoranSHKC24,
  author       = {Madeline Moran and
                  Arrianna Szymczak and
                  Anna Hart and
                  Shelia Kennison and
                  Eric Chan{-}Tin},
  editor       = {Tianqing Zhu and
                  Yannan Li},
  title        = {Deep Dive on Relationship Between Personality and Password Creation},
  booktitle    = {Information Security and Privacy - 29th Australasian Conference, {ACISP}
                  2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14896},
  pages        = {393--411},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-5028-3\_20},
  doi          = {10.1007/978-981-97-5028-3\_20},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MoranSHKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-01963,
  author       = {Firuz Juraev and
                  Mohammed Abuhamad and
                  Eric Chan{-}Tin and
                  George K. Thiruvathukal and
                  Tamer Abuhmed},
  title        = {From Attack to Defense: Insights into Deep Learning Security Measures
                  in Black-Box Settings},
  journal      = {CoRR},
  volume       = {abs/2405.01963},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.01963},
  doi          = {10.48550/ARXIV.2405.01963},
  eprinttype    = {arXiv},
  eprint       = {2405.01963},
  timestamp    = {Sun, 09 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-01963.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csonet/KhanGKMASHFC23,
  author       = {Muhammad T. Khan and
                  Rachel Gordon and
                  Nimra Khan and
                  Madeline Moran and
                  Mohammed Abuhamad and
                  Loretta J. Stalans and
                  Jeffrey Huntsinger and
                  Jennifer Forestal and
                  Eric Chan{-}Tin},
  editor       = {Minh Ho{\`{a}}ng H{\`{a}} and
                  Xingquan Zhu and
                  My T. Thai},
  title        = {Identification and Analysis of the Spread of \{Mis\}information on
                  Social Media},
  booktitle    = {Computational Data and Social Networks - 12th International Conference,
                  CSoNet 2023, Hanoi, Vietnam, December 11-13, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14479},
  pages        = {361--372},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0669-3\_33},
  doi          = {10.1007/978-981-97-0669-3\_33},
  timestamp    = {Sat, 17 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csonet/KhanGKMASHFC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/svcc/ReyesDCMCAK23,
  author       = {Daisy Reyes and
                  Eno Dynowski and
                  Taryn Chovan and
                  John Mikos and
                  Eric Chan{-}Tin and
                  Mohammed Abuhamad and
                  Shelia Kennison},
  title        = {WebTracker: Real Webbrowsing Behaviors},
  booktitle    = {Silicon Valley Cybersecurity Conference, {SVCC} 2023, San Jose, CA,
                  USA, May 17-19, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SVCC56964.2023.10164930},
  doi          = {10.1109/SVCC56964.2023.10164930},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/svcc/ReyesDCMCAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/svcc/ShaoHYCA23,
  author       = {Yong Shao and
                  Kenneth Hernandez and
                  Kia Yang and
                  Eric Chan{-}Tin and
                  Mohammed Abuhamad},
  title        = {Lightweight and Effective Website Fingerprinting Over Encrypted {DNS}},
  booktitle    = {Silicon Valley Cybersecurity Conference, {SVCC} 2023, San Jose, CA,
                  USA, May 17-19, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SVCC56964.2023.10165086},
  doi          = {10.1109/SVCC56964.2023.10165086},
  timestamp    = {Mon, 10 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/svcc/ShaoHYCA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/AhlgrenRSCTK23,
  author       = {Isaac Ahlgren and
                  Victor Rakotondranoro and
                  Yasin N. Silva and
                  Eric Chan{-}Tin and
                  George K. Thiruvathukal and
                  Neil Klingensmith},
  title        = {Userland Containers for Mobile Systems},
  booktitle    = {Proceedings of the 24th International Workshop on Mobile Computing
                  Systems and Applications, HotMobile 2023, Newport Beach, California,
                  February 22-23, 2023},
  pages        = {141},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3572864.3581588},
  doi          = {10.1145/3572864.3581588},
  timestamp    = {Tue, 14 Feb 2023 11:37:11 +0100},
  biburl       = {https://dblp.org/rec/conf/wmcsa/AhlgrenRSCTK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hpdc/2023snta,
  editor       = {Massimo Cafaro and
                  Eric Chan{-}Tin and
                  Jerry Chou and
                  Jinoh Kim},
  title        = {Proceedings of the 2023 on Systems and Network Telemetry and Analytics,
                  {SNTA} 2023, Orlando, FL, USA, 20 June 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589012},
  doi          = {10.1145/3589012},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpdc/2023snta.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-06496,
  author       = {Eldor Abdukhamidov and
                  Mohammed Abuhamad and
                  Simon S. Woo and
                  Eric Chan{-}Tin and
                  Tamer Abuhmed},
  title        = {Microbial Genetic Algorithm-based Black-box Attack against Interpretable
                  Deep Learning Systems},
  journal      = {CoRR},
  volume       = {abs/2307.06496},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.06496},
  doi          = {10.48550/ARXIV.2307.06496},
  eprinttype    = {arXiv},
  eprint       = {2307.06496},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-06496.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-11906,
  author       = {Eldor Abdukhamidov and
                  Mohammed Abuhamad and
                  Simon S. Woo and
                  Eric Chan{-}Tin and
                  Tamer Abuhmed},
  title        = {Unveiling Vulnerabilities in Interpretable Deep Learning Systems with
                  Query-Efficient Black-box Attacks},
  journal      = {CoRR},
  volume       = {abs/2307.11906},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.11906},
  doi          = {10.48550/ARXIV.2307.11906},
  eprinttype    = {arXiv},
  eprint       = {2307.11906},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-11906.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/WagnerBKC22,
  author       = {Anne Wagner and
                  Anna Bakas and
                  Shelia Kennison and
                  Eric Chan{-}Tin},
  title        = {Comparing Online Surveys for Cybersecurity: {SONA} and MTurk},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {30},
  pages        = {2},
  year         = {2022},
  url          = {https://doi.org/10.4108/eai.8-2-2022.173334},
  doi          = {10.4108/EAI.8-2-2022.173334},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/WagnerBKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/WagnerBRKC22,
  author       = {Anne Wagner and
                  Anna Bakas and
                  Daisy Reyes and
                  Shelia Kennison and
                  Eric Chan{-}Tin},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {The Personalities of Social Media Posts and Photos},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {1231--1233},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3527291},
  doi          = {10.1145/3488932.3527291},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/WagnerBRKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/Chan-TinK22,
  author       = {Eric Chan{-}Tin and
                  Shelia Kennison},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {CySSS '22: 1st International Workshop on Cybersecurity and Social
                  Sciences},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {1267--1268},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517203},
  doi          = {10.1145/3488932.3517203},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/Chan-TinK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cysss/SunAACA22,
  author       = {Qirui Sun and
                  Mohammed Abuhamad and
                  Eldor Abdukhamidov and
                  Eric Chan{-}Tin and
                  Tamer Abuhmed},
  editor       = {Eric Chan{-}Tin and
                  Shelia Kennison},
  title        = {MLxPack: Investigating the Effects of Packers on ML-based Malware
                  Detection Systems Using Static and Dynamic Traits},
  booktitle    = {CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity
                  and Social Sciences, Nagasaki, Japan, 30 May 2022},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494108.3522768},
  doi          = {10.1145/3494108.3522768},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cysss/SunAACA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpdc/Chan-TinSJRK22,
  author       = {Eric Chan{-}Tin and
                  Loretta J. Stalans and
                  Spencer Johnston and
                  Daisy Reyes and
                  Shelia Kennison},
  editor       = {Massimo Cafaro and
                  Jerry Chou and
                  Jinoh Kim and
                  Alex Sim},
  title        = {Predicting Phishing Victimization: Roles of Protective and Vulnerable
                  Strategies and Decision-Making Styles},
  booktitle    = {SNTA@HPDC 2022, Fifth International Workshop on Systems and Network
                  Telemetry and Analytics, Minneapolis, MN, USA, 30 June 2022},
  pages        = {35--42},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3526064.3534107},
  doi          = {10.1145/3526064.3534107},
  timestamp    = {Sat, 17 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpdc/Chan-TinSJRK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cysss/2022,
  editor       = {Eric Chan{-}Tin and
                  Shelia Kennison},
  title        = {CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity
                  and Social Sciences, Nagasaki, Japan, 30 May 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494108},
  doi          = {10.1145/3494108},
  isbn         = {978-1-4503-9177-1},
  timestamp    = {Wed, 25 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cysss/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-15926,
  author       = {Eldor Abdukhamidov and
                  Mohammed Abuhamad and
                  Simon S. Woo and
                  Eric Chan{-}Tin and
                  Tamer Abuhmed},
  title        = {Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial
                  Perturbations against Interpretable Deep Learning},
  journal      = {CoRR},
  volume       = {abs/2211.15926},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.15926},
  doi          = {10.48550/ARXIV.2211.15926},
  eprinttype    = {arXiv},
  eprint       = {2211.15926},
  timestamp    = {Fri, 02 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-15926.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/BakasWJKC21,
  author       = {Anna Bakas and
                  Anne Wagner and
                  Spencer Johnston and
                  Shelia Kennison and
                  Eric Chan{-}Tin},
  title        = {Impact of Personality Types and Matching Messaging on Password Strength},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e1},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.1-6-2021.170012},
  doi          = {10.4108/EAI.1-6-2021.170012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/BakasWJKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csonet/AbdukhamidovAJC21,
  author       = {Eldor Abdukhamidov and
                  Mohammed Abuhamad and
                  Firuz Juraev and
                  Eric Chan{-}Tin and
                  Tamer AbuHmed},
  editor       = {David Mohaisen and
                  Ruoming Jin},
  title        = {AdvEdge: Optimizing Adversarial Perturbations Against Interpretable
                  Deep Learning},
  booktitle    = {Computational Data and Social Networks - 10th International Conference,
                  CSoNet 2021, Virtual Event, November 15-17, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13116},
  pages        = {93--105},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91434-9\_9},
  doi          = {10.1007/978-3-030-91434-9\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csonet/AbdukhamidovAJC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eicc/WagnerBKC21,
  author       = {Anne Wagner and
                  Anna Bakas and
                  Shelia Kennison and
                  Eric Chan{-}Tin},
  editor       = {Martin Gilje Jaatun and
                  Geir M. K{\o}ien and
                  Oksana Kulyk},
  title        = {A Comparison of {SONA} and MTurk for Cybersecurity Surveys},
  booktitle    = {{EICC} '21: European Interdisciplinary Cybersecurity Conference, Virtual
                  Event, Romania, November 10-11, 2021},
  pages        = {87--88},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3487405.3487657},
  doi          = {10.1145/3487405.3487657},
  timestamp    = {Thu, 25 Nov 2021 12:07:01 +0100},
  biburl       = {https://dblp.org/rec/conf/eicc/WagnerBKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangHGCG20,
  author       = {Zonghao Huang and
                  Rui Hu and
                  Yuanxiong Guo and
                  Eric Chan{-}Tin and
                  Yanmin Gong},
  title        = {{DP-ADMM:} ADMM-Based Distributed Learning With Differential Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1002--1012},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2931068},
  doi          = {10.1109/TIFS.2019.2931068},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangHGCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/automotiveUI/AbegazCKT20,
  author       = {Brook W. Abegaz and
                  Eric Chan{-}Tin and
                  Neil Klingensmith and
                  George K. Thiruvathukal},
  title        = {Addressing Rogue Vehicles by Integrating Computer Vision, Activity
                  Monitoring, and Contextual Information},
  booktitle    = {Adjunct Proceedings of the 12th International Conference on Automotive
                  User Interfaces and Interactive Vehicular Applications, AutomotiveUI
                  2020, Virtual Event, Washington, DC, USA, September 21-22, 2020},
  pages        = {62--64},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3409251.3411724},
  doi          = {10.1145/3409251.3411724},
  timestamp    = {Thu, 27 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/automotiveUI/AbegazCKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpdc/Chan-Tin20,
  author       = {Eric Chan{-}Tin},
  editor       = {Massimo Cafaro and
                  Jinoh Kim and
                  Alex Sim},
  title        = {2020 Vision for Web Privacy},
  booktitle    = {Proceedings of the 3rd International Workshop on Systems and Network
                  Telemetry and Analytics, SNTA@HPDC 2020, Stockholm, Sweden, June 23,
                  2020},
  pages        = {31},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3391812.3396267},
  doi          = {10.1145/3391812.3396267},
  timestamp    = {Fri, 19 Jun 2020 12:28:20 +0200},
  biburl       = {https://dblp.org/rec/conf/hpdc/Chan-Tin20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/CuiCC20,
  author       = {Weiqi Cui and
                  Tao Chen and
                  Eric Chan{-}Tin},
  title        = {More Realistic Website Fingerprinting Using Deep Learning},
  booktitle    = {40th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2020, Singapore, November 29 - December 1, 2020},
  pages        = {333--343},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDCS47774.2020.00058},
  doi          = {10.1109/ICDCS47774.2020.00058},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/CuiCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/CuiYGC19,
  author       = {Weiqi Cui and
                  Jiangmin Yu and
                  Yanmin Gong and
                  Eric Chan{-}Tin},
  title        = {Efficient, Effective, and Realistic Website Fingerprinting Mitigation},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {20},
  pages        = {e2},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.29-1-2019.161977},
  doi          = {10.4108/EAI.29-1-2019.161977},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/CuiYGC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CuiCFCSC19,
  author       = {Weiqi Cui and
                  Tao Chen and
                  Christian Fields and
                  Julianna Chen and
                  Anthony Sierra and
                  Eric Chan{-}Tin},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Revisiting Assumptions for Website Fingerprinting Attacks},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {328--339},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329802},
  doi          = {10.1145/3321705.3329802},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CuiCFCSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChenCC19,
  author       = {Tao Chen and
                  Weiqi Cui and
                  Eric Chan{-}Tin},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {Measuring Tor Relay Popularity},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {304},
  pages        = {386--405},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37228-6\_19},
  doi          = {10.1007/978-3-030-37228-6\_19},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChenCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChenFC18,
  author       = {Tao Chen and
                  Michael Farcasin and
                  Eric Chan{-}Tin},
  title        = {Smartphone passcode prediction},
  journal      = {{IET} Inf. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {431--437},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-ifs.2017.0606},
  doi          = {10.1049/IET-IFS.2017.0606},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChenFC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Chan-TinR18,
  author       = {Eric Chan{-}Tin and
                  Rakesh Ravishankar},
  title        = {The case for {HTTPS:} measuring overhead and impact of certificate
                  authorities},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {4},
  pages        = {261--269},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10015823},
  doi          = {10.1504/IJSN.2018.10015823},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Chan-TinR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/Chan-TinKK18,
  author       = {Eric Chan{-}Tin and
                  Taejoon Kim and
                  Jinoh Kim},
  title        = {Website Fingerprinting Attack Mitigation Using Traffic Morphing},
  booktitle    = {38th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2018, Vienna, Austria, July 2-6, 2018},
  pages        = {1575--1578},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICDCS.2018.00174},
  doi          = {10.1109/ICDCS.2018.00174},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/Chan-TinKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/CuiYGC18,
  author       = {Weiqi Cui and
                  Jiangmin Yu and
                  Yanmin Gong and
                  Eric Chan{-}Tin},
  title        = {Realistic Cover Traffic to Mitigate Website Fingerprinting Attacks},
  booktitle    = {38th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2018, Vienna, Austria, July 2-6, 2018},
  pages        = {1579--1584},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICDCS.2018.00175},
  doi          = {10.1109/ICDCS.2018.00175},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/CuiYGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-10101,
  author       = {Zonghao Huang and
                  Rui Hu and
                  Eric Chan{-}Tin and
                  Yanmin Gong},
  title        = {{DP-ADMM:} ADMM-based Distributed Learning with Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/1808.10101},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.10101},
  eprinttype    = {arXiv},
  eprint       = {1808.10101},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-10101.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/KhethavathTC17,
  author       = {Praveenkumar Khethavath and
                  Johnson P. Thomas and
                  Eric Chan{-}Tin},
  title        = {Towards an efficient distributed cloud computing architecture},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {10},
  number       = {5},
  pages        = {1152--1168},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12083-016-0468-x},
  doi          = {10.1007/S12083-016-0468-X},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/KhethavathTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/YuFC17,
  author       = {Jiangmin Yu and
                  Michael Farcasin and
                  Eric Chan{-}Tin},
  title        = {Wireless Interference Prediction for Embedded Health Devices},
  booktitle    = {26th International Conference on Computer Communication and Networks,
                  {ICCCN} 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICCCN.2017.8038501},
  doi          = {10.1109/ICCCN.2017.8038501},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/YuFC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-09333,
  author       = {Michael Farcasin and
                  Akhileshwar Guli and
                  Eric Chan{-}Tin},
  title        = {Fluid Passwords - Mitigating the effects of password leaks at the
                  user level},
  journal      = {CoRR},
  volume       = {abs/1708.09333},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.09333},
  eprinttype    = {arXiv},
  eprint       = {1708.09333},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-09333.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/CecilKGPCY16,
  author       = {Joe Cecil and
                  M. Bharathi Raj Kumar and
                  Avinash Gupta and
                  Miguel Pirela{-}Cruz and
                  Eric Chan{-}Tin and
                  Jiangmin Yu},
  editor       = {Ioana Ciuciu and
                  Christophe Debruyne and
                  Herv{\'{e}} Panetto and
                  Georg Weichhart and
                  Peter Bollen and
                  Anna Fensel and
                  Maria{-}Esther Vidal},
  title        = {Development of a Virtual Reality Based Simulation Environment for
                  Orthopedic Surgical Training},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2016 Workshops -
                  Confederated International Workshops: EI2N, FBM, ICSP, Meta4eS, and
                  {OTMA} 2016, Rhodes, Greece, October 24-28, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10034},
  pages        = {206--214},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-55961-2\_21},
  doi          = {10.1007/978-3-319-55961-2\_21},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/otm/CecilKGPCY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Chan-TinHHK15,
  author       = {Eric Chan{-}Tin and
                  Victor Heorhiadi and
                  Nicholas Hopper and
                  Yongdae Kim},
  title        = {Hijacking the Vuze BitTorrent network: all your hop are belong to
                  us},
  journal      = {{IET} Inf. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {203--208},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-ifs.2014.0337},
  doi          = {10.1049/IET-IFS.2014.0337},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Chan-TinHHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ShinCK15,
  author       = {Jiyoung Shin and
                  Eric Chan{-}Tin and
                  Praveenkumar Khethavath},
  title        = {Accurate geolocation using network coordinates},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {3},
  pages        = {170--182},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.071830},
  doi          = {10.1504/IJSN.2015.071830},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ShinCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FarcasinC15,
  author       = {Michael Farcasin and
                  Eric Chan{-}Tin},
  title        = {Why we hate {IT:} two surveys on pre-generated and expiring passwords
                  in an academic setting},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2361--2373},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1184},
  doi          = {10.1002/SEC.1184},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FarcasinC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShinKFC15,
  author       = {Jiyoung Shin and
                  S. Kancharlapalli and
                  Michael Farcasin and
                  Eric Chan{-}Tin},
  title        = {SmartPass: a smarter geolocation-based authentication scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3927--3938},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1311},
  doi          = {10.1002/SEC.1311},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShinKFC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Chan-Tin15,
  author       = {Eric Chan{-}Tin},
  title        = {AnonCall: Making Anonymous Cellular Phone Calls},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {626--631},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.13},
  doi          = {10.1109/ARES.2015.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Chan-Tin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhcr/Chan-TinC14,
  author       = {Eric Chan{-}Tin and
                  Qi Cheng},
  title        = {Secure Routing and Scheduling in Ad-Hoc Cognitive Radio Networks for
                  Public Safety},
  journal      = {Int. J. Handheld Comput. Res.},
  volume       = {5},
  number       = {2},
  pages        = {44--60},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijhcr.2014040103},
  doi          = {10.4018/IJHCR.2014040103},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhcr/Chan-TinC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acssc/ChengC14,
  author       = {Qi Cheng and
                  Eric Chan{-}Tin},
  editor       = {Michael B. Matthews},
  title        = {A unified framework for robust cooperative spectrum sensing},
  booktitle    = {48th Asilomar Conference on Signals, Systems and Computers, {ACSSC}
                  2014, Pacific Grove, CA, USA, November 2-5, 2014},
  pages        = {1589--1593},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ACSSC.2014.7094733},
  doi          = {10.1109/ACSSC.2014.7094733},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acssc/ChengC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/YuC14,
  author       = {Jiangmin Yu and
                  Eric Chan{-}Tin},
  editor       = {Gail{-}Joon Ahn and
                  Anupam Datta},
  title        = {Identifying Webbrowsers in Encrypted Communications},
  booktitle    = {Proceedings of the 13th Workshop on Privacy in the Electronic Society,
                  {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014},
  pages        = {135--138},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665943.2665968},
  doi          = {10.1145/2665943.2665968},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/YuC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangTCMKHK13,
  author       = {Peng Wang and
                  James Tyra and
                  Eric Chan{-}Tin and
                  Tyson Malchow and
                  Denis Foo Kune and
                  Nicholas Hopper and
                  Yongdae Kim},
  title        = {Attacking the kad network - real world evaluation and high fidelity
                  simulation using {DVN}},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1556--1575},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.172},
  doi          = {10.1002/SEC.172},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/WangTCMKHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Chan-TinSY13,
  author       = {Eric Chan{-}Tin and
                  Jiyoung Shin and
                  Jiangmin Yu},
  title        = {Revisiting Circuit Clogging Attacks on Tor},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {131--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.17},
  doi          = {10.1109/ARES.2013.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Chan-TinSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/KhethavathTCL13,
  author       = {Praveen Khethavath and
                  Johnson P. Thomas and
                  Eric Chan{-}Tin and
                  Hong Liu},
  title        = {Introducing a Distributed Cloud Architecture with Efficient Resource
                  Discovery and Optimal Resource Allocation},
  booktitle    = {{IEEE} Ninth World Congress on Services, {SERVICES} 2013, Santa Clara,
                  CA, USA, June 28 - July 3, 2013},
  pages        = {386--392},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERVICES.2013.68},
  doi          = {10.1109/SERVICES.2013.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/KhethavathTCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chan-TinH12,
  author       = {Eric Chan{-}Tin and
                  Nicholas Hopper},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {KoNKS: konsensus-style network koordinate system},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {61--62},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414491},
  doi          = {10.1145/2414456.2414491},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Chan-TinH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Chan-TinHHK11,
  author       = {Eric Chan{-}Tin and
                  Victor Heorhiadi and
                  Nicholas Hopper and
                  Yongdae Kim},
  title        = {The Frog-Boiling Attack: Limitations of Secure Network Coordinate
                  Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {27:1--27:23},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043621.2043627},
  doi          = {10.1145/2043621.2043627},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Chan-TinHHK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Chan-TinH11,
  author       = {Eric Chan{-}Tin and
                  Nicholas Hopper},
  title        = {Accurate and Provably Secure Latency Estimation with Treeple},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/accurate-and-provably-secure-latency-estimation-treeple},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Chan-TinH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HopperVC10,
  author       = {Nicholas Hopper and
                  Eugene Y. Vasserman and
                  Eric Chan{-}Tin},
  title        = {How much anonymity does network latency leak?},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {13:1--13:28},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698753},
  doi          = {10.1145/1698750.1698753},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HopperVC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chan-TinH10,
  author       = {Eric Chan{-}Tin and
                  Nicholas Hopper},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Secure latency estimation with treeple},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {660--662},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866389},
  doi          = {10.1145/1866307.1866389},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Chan-TinH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KangCLTKNWSHDK09,
  author       = {Brent ByungHoon Kang and
                  Eric Chan{-}Tin and
                  Christopher P. Lee and
                  James Tyra and
                  Hun Jeong Kang and
                  Chris Nunnery and
                  Zachariah Wadler and
                  Greg Sinclair and
                  Nicholas Hopper and
                  David Dagon and
                  Yongdae Kim},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Towards complete node enumeration in a peer-to-peer botnet},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533064},
  doi          = {10.1145/1533057.1533064},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KangCLTKNWSHDK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/KangCHK09,
  author       = {Hun Jeong Kang and
                  Eric Chan{-}Tin and
                  Nicholas Hopper and
                  Yongdae Kim},
  editor       = {Henning Schulzrinne and
                  Karl Aberer and
                  Anwitaman Datta},
  title        = {Why Kad Lookup Fails},
  booktitle    = {Proceedings {P2P} 2009, Ninth International Conference on Peer-to-Peer
                  Computing, 9-11 September 2009, Seattle, Washington, {USA}},
  pages        = {121--130},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/P2P.2009.5284547},
  doi          = {10.1109/P2P.2009.5284547},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/p2p/KangCHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Chan-TinFHK09,
  author       = {Eric Chan{-}Tin and
                  Daniel Feldman and
                  Nicholas Hopper and
                  Yongdae Kim},
  editor       = {Yan Chen and
                  Tassos Dimitriou and
                  Jianying Zhou},
  title        = {The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure
                  Network Coordinate Systems},
  booktitle    = {Security and Privacy in Communication Networks - 5th International
                  {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {19},
  pages        = {448--458},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05284-2\_26},
  doi          = {10.1007/978-3-642-05284-2\_26},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/Chan-TinFHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WangTCMKHK08,
  author       = {Peng Wang and
                  James Tyra and
                  Eric Chan{-}Tin and
                  Tyson Malchow and
                  Denis Foo Kune and
                  Nicholas Hopper and
                  Yongdae Kim},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Attacking the Kad network},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {23},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460907},
  doi          = {10.1145/1460877.1460907},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/WangTCMKHK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HopperVC07,
  author       = {Nicholas Hopper and
                  Eugene Y. Vasserman and
                  Eric Chan{-}Tin},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {How much anonymity does network latency leak?},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {82--91},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315257},
  doi          = {10.1145/1315245.1315257},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HopperVC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}