BibTeX records: Matthew Wright 0001

download as .bib file

@inproceedings{DBLP:conf/sp/MathewsHORHW23,
  author       = {Nate Mathews and
                  James K. Holland and
                  Se Eun Oh and
                  Mohammad Saidur Rahman and
                  Nicholas Hopper and
                  Matthew Wright},
  title        = {SoK: {A} Critical Evaluation of Efficient Website Fingerprinting Defenses},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {969--986},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179289},
  doi          = {10.1109/SP46215.2023.10179289},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MathewsHORHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/Al-AmeenMFWS22,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  Sonali Tukaram Marne and
                  Kanis Fatema and
                  Matthew Wright and
                  Shannon Scielzo},
  title        = {On improving the memorability of system-assigned recognition-based
                  passwords},
  journal      = {Behav. Inf. Technol.},
  volume       = {41},
  number       = {5},
  pages        = {1115--1131},
  year         = {2022},
  url          = {https://doi.org/10.1080/0144929x.2020.1858161},
  doi          = {10.1080/0144929X.2020.1858161},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/Al-AmeenMFWS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/collas/RahmanCW22,
  author       = {Mohammad Saidur Rahman and
                  Scott E. Coull and
                  Matthew Wright},
  editor       = {Sarath Chandar and
                  Razvan Pascanu and
                  Doina Precup},
  title        = {On the Limitations of Continual Learning for Malware Classification},
  booktitle    = {Conference on Lifelong Learning Agents, CoLLAs 2022, 22-24 August
                  2022, McGill University, Montr{\'{e}}al, Qu{\'{e}}bec, Canada},
  series       = {Proceedings of Machine Learning Research},
  volume       = {199},
  pages        = {564--582},
  publisher    = {{PMLR}},
  year         = {2022},
  url          = {https://proceedings.mlr.press/v199/rahman22a.html},
  timestamp    = {Sat, 18 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/collas/RahmanCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OhYMH0H022,
  author       = {Se Eun Oh and
                  Taiji Yang and
                  Nate Mathews and
                  James K. Holland and
                  Mohammad Saidur Rahman and
                  Nicholas Hopper and
                  Matthew Wright},
  title        = {DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning
                  and Amplification},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1915--1932},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833801},
  doi          = {10.1109/SP46214.2022.9833801},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/OhYMH0H022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdc/ShahriyarW22,
  author       = {Shaikh Akib Shahriyar and
                  Matthew K. Wright},
  editor       = {Simon S. Woo and
                  Shahroz Tariq and
                  Hyoungshick Kim},
  title        = {Evaluating Robustness of Sequence-based Deepfake Detector Models by
                  Adversarial Perturbation},
  booktitle    = {WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications
                  of Deepfakes and Cheapfakes, Nagasaki, Japan, 30 May 2022},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494109.3527194},
  doi          = {10.1145/3494109.3527194},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wdc/ShahriyarW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-06568,
  author       = {Mohammad Saidur Rahman and
                  Scott E. Coull and
                  Matthew Wright},
  title        = {On the Limitations of Continual Learning for Malware Classification},
  journal      = {CoRR},
  volume       = {abs/2208.06568},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.06568},
  doi          = {10.48550/ARXIV.2208.06568},
  eprinttype    = {arXiv},
  eprint       = {2208.06568},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-06568.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SengAW21,
  author       = {Sovantharith Seng and
                  Mahdi Nasrullah Al{-}Ameen and
                  Matthew Wright},
  title        = {A first look into users' perceptions of facial recognition in the
                  physical world},
  journal      = {Comput. Secur.},
  volume       = {105},
  pages        = {102227},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102227},
  doi          = {10.1016/J.COSE.2021.102227},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SengAW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SengAW21,
  author       = {Sovantharith Seng and
                  Mahdi Nasrullah Al{-}Ameen and
                  Matthew Wright},
  title        = {A look into user privacy andthird-party applications in Facebook},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {283--313},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-08-2019-0108},
  doi          = {10.1108/ICS-08-2019-0108},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/SengAW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/OhMRWH21,
  author       = {Se Eun Oh and
                  Nate Mathews and
                  Mohammad Saidur Rahman and
                  Matthew Wright and
                  Nicholas Hopper},
  title        = {GANDaLF: {GAN} for Data-Limited Fingerprinting},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {2},
  pages        = {305--322},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0029},
  doi          = {10.2478/POPETS-2021-0029},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/OhMRWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RahmanIMW21,
  author       = {Mohammad Saidur Rahman and
                  Mohsen Imani and
                  Nate Mathews and
                  Matthew Wright},
  title        = {Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting
                  Attacks With Adversarial Traces},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {1594--1609},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3039691},
  doi          = {10.1109/TIFS.2020.3039691},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RahmanIMW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmvc/LinBWK21,
  author       = {Xinmiao Lin and
                  Wentao Bao and
                  Matthew K. Wright and
                  Yu Kong},
  title        = {Gradient Frequency Modulation for Visually Explaining Video Understanding
                  Models},
  booktitle    = {32nd British Machine Vision Conference 2021, {BMVC} 2021, Online,
                  November 22-25, 2021},
  pages        = {14},
  publisher    = {{BMVA} Press},
  year         = {2021},
  url          = {https://www.bmvc2021-virtualconference.com/assets/papers/0059.pdf},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bmvc/LinBWK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/Doolani0SH21,
  author       = {Jayesh Doolani and
                  Matthew Wright and
                  Rajesh Setty and
                  S. M. Taiabul Haque},
  editor       = {Yoshifumi Kitamura and
                  Aaron Quigley and
                  Katherine Isbister and
                  Takeo Igarashi and
                  Pernille Bj{\o}rn and
                  Steven Mark Drucker},
  title        = {LociMotion: Towards Learning a Strong Authentication Secret in a Single
                  Session},
  booktitle    = {{CHI} '21: {CHI} Conference on Human Factors in Computing Systems,
                  Virtual Event / Yokohama, Japan, May 8-13, 2021},
  pages        = {689:1--689:13},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3411764.3445105},
  doi          = {10.1145/3411764.3445105},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/Doolani0SH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/HylandSLRM021,
  author       = {Jack Hyland and
                  Conrad Schneggenburger and
                  Nick Lim and
                  Jake Ruud and
                  Nate Mathews and
                  Matthew Wright},
  title        = {What a {SHAME:} Smart Assistant Voice Command Fingerprinting Utilizing
                  Deep Learning},
  booktitle    = {{WPES} '21: Proceedings of the 20th Workshop on Workshop on Privacy
                  in the Electronic Society, Virtual Event, Korea, 15 November 2021},
  pages        = {237--243},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3463676.3485615},
  doi          = {10.1145/3463676.3485615},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/HylandSLRM021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-01215,
  author       = {Xinmiao Lin and
                  Wentao Bao and
                  Matthew K. Wright and
                  Yu Kong},
  title        = {Gradient Frequency Modulation for Visually Explaining Video Understanding
                  Models},
  journal      = {CoRR},
  volume       = {abs/2111.01215},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.01215},
  eprinttype    = {arXiv},
  eprint       = {2111.01215},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-01215.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jstsp/ChinthaTSBHWP20,
  author       = {Akash Chintha and
                  Bao Thai and
                  Saniat Javid Sohrawardi and
                  Kartavya Bhatt and
                  Andrea Hickerson and
                  Matthew Wright and
                  Raymond W. Ptucha},
  title        = {Recurrent Convolutional Structures for Audio Spoof and Video Deepfake
                  Detection},
  journal      = {{IEEE} J. Sel. Top. Signal Process.},
  volume       = {14},
  number       = {5},
  pages        = {1024--1037},
  year         = {2020},
  url          = {https://doi.org/10.1109/JSTSP.2020.2999185},
  doi          = {10.1109/JSTSP.2020.2999185},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jstsp/ChinthaTSBHWP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RahmanSMG020,
  author       = {Mohammad Saidur Rahman and
                  Payap Sirinam and
                  Nate Mathews and
                  Kantha Girish Gangadhara and
                  Matthew Wright},
  title        = {Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {3},
  pages        = {5--24},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0043},
  doi          = {10.2478/POPETS-2020-0043},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/RahmanSMG020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LevineLL020,
  author       = {Brian Neil Levine and
                  Marc Liberatore and
                  Brian Lynn and
                  Matthew Wright},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {A Forensically Sound Method of Identifying Downloaders and Uploaders
                  in Freenet},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1497--1512},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417876},
  doi          = {10.1145/3372297.3417876},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LevineLL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MosliWYP20,
  author       = {Rayan Mosli and
                  Matthew Wright and
                  Bo Yuan and
                  Yin Pan},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {They Might {NOT} Be Giants Crafting Black-Box Adversarial Examples
                  Using Particle Swarm Optimization},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {439--459},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_22},
  doi          = {10.1007/978-3-030-59013-0\_22},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MosliWYP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/ChinthaRSBWP20,
  author       = {Akash Chintha and
                  Aishwarya Rao and
                  Saniat Javid Sohrawardi and
                  Kartavya Bhatt and
                  Matthew Wright and
                  Raymond W. Ptucha},
  title        = {Leveraging edges and optical flow on faces for deepfake detection},
  booktitle    = {2020 {IEEE} International Joint Conference on Biometrics, {IJCB} 2020,
                  Houston, TX, USA, September 28 - October 1, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IJCB48548.2020.9304936},
  doi          = {10.1109/IJCB48548.2020.9304936},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icb/ChinthaRSBWP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/DengL020,
  author       = {Perry Deng and
                  Cooper Linsky and
                  Matthew Wright},
  title        = {Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with
                  Weakly Labeled Data},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2020, Arlington, VA, USA, November 9-10, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISI49825.2020.9280538},
  doi          = {10.1109/ISI49825.2020.9280538},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/DengL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-04382,
  author       = {Perry Deng and
                  Cooper Linsky and
                  Matthew Wright},
  title        = {Weaponizing Unicodes with Deep Learning - Identifying Homoglyphs with
                  Weakly Labeled Data},
  journal      = {CoRR},
  volume       = {abs/2010.04382},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.04382},
  eprinttype    = {arXiv},
  eprint       = {2010.04382},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-04382.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-05850,
  author       = {Perry Deng and
                  Mohammad Saidur Rahman and
                  Matthew Wright},
  title        = {Detecting Adversarial Patches with Class Conditional Reconstruction
                  Networks},
  journal      = {CoRR},
  volume       = {abs/2011.05850},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.05850},
  eprinttype    = {arXiv},
  eprint       = {2011.05850},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-05850.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/ImaniAW19,
  author       = {Mohsen Imani and
                  Mehrdad Amirabadi and
                  Matthew Wright},
  title        = {Modified relay selection and circuit selection for faster Tor},
  journal      = {{IET} Commun.},
  volume       = {13},
  number       = {17},
  pages        = {2723--2734},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-com.2018.5591},
  doi          = {10.1049/IET-COM.2018.5591},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-com/ImaniAW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SirinamMR019,
  author       = {Payap Sirinam and
                  Nate Mathews and
                  Mohammad Saidur Rahman and
                  Matthew Wright},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Triplet Fingerprinting: More Practical and Portable Website Fingerprinting
                  with N-shot Learning},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1131--1148},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354217},
  doi          = {10.1145/3319535.3354217},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SirinamMR019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SohrawardiCTSHP19,
  author       = {Saniat Javid Sohrawardi and
                  Akash Chintha and
                  Bao Thai and
                  Sovantharith Seng and
                  Andrea Hickerson and
                  Raymond W. Ptucha and
                  Matthew Wright},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Poster: Towards Robust Open-World Detection of Deepfakes},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2613--2615},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363269},
  doi          = {10.1145/3319535.3363269},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SohrawardiCTSHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SengKA019,
  author       = {Sovantharith Seng and
                  Huzeyfe Kocabas and
                  Mahdi Nasrullah Al{-}Ameen and
                  Matthew Wright},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Poster: Understanding User's Decision to Interact with Potential Phishing
                  Posts on Facebook using a Vignette Study},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2617--2619},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363270},
  doi          = {10.1145/3319535.3363270},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SengKA019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MathewsRW19,
  author       = {Nate Mathews and
                  Mohammad Saidur Rahman and
                  Matthew Wright},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Poster: Evaluating Security Metrics for Website Fingerprinting},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2625--2627},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363272},
  doi          = {10.1145/3319535.3363272},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MathewsRW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RahmanMW19,
  author       = {Mohammad Saidur Rahman and
                  Nate Mathews and
                  Matthew Wright},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Poster: Video Fingerprinting in Tor},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2629--2631},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363273},
  doi          = {10.1145/3319535.3363273},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RahmanMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-06421,
  author       = {Mohammad Saidur Rahman and
                  Payap Sirinam and
                  Nate Mathews and
                  Kantha Girish Gangadhara and
                  Matthew Wright},
  title        = {Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks},
  journal      = {CoRR},
  volume       = {abs/1902.06421},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.06421},
  eprinttype    = {arXiv},
  eprint       = {1902.06421},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-06421.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-06626,
  author       = {Mohsen Imani and
                  Mohammad Saidur Rahman and
                  Nate Mathews and
                  Aneesh Yogesh Joshi and
                  Matthew Wright},
  title        = {Adv-DWF: Defending Against Deep-Learning-Based Website Fingerprinting
                  Attacks with Adversarial Traces},
  journal      = {CoRR},
  volume       = {abs/1902.06626},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.06626},
  eprinttype    = {arXiv},
  eprint       = {1902.06626},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-06626.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-07490,
  author       = {Rayan Mosli and
                  Matthew Wright and
                  Bo Yuan and
                  Yin Pan},
  title        = {They Might {NOT} Be Giants: Crafting Black-Box Adversarial Examples
                  with Fewer Queries Using Particle Swarm Optimization},
  journal      = {CoRR},
  volume       = {abs/1909.07490},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.07490},
  eprinttype    = {arXiv},
  eprint       = {1909.07490},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-07490.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ImaniBW18,
  author       = {Mohsen Imani and
                  Armon Barton and
                  Matthew Wright},
  title        = {Guard Sets in Tor using {AS} Relationships},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {1},
  pages        = {145--165},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0008},
  doi          = {10.1515/POPETS-2018-0008},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/ImaniBW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SirinamIJW18,
  author       = {Payap Sirinam and
                  Mohsen Imani and
                  Marc Juarez and
                  Matthew Wright},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Deep Fingerprinting: Undermining Website Fingerprinting Defenses with
                  Deep Learning},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1928--1943},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243768},
  doi          = {10.1145/3243734.3243768},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SirinamIJW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ImaniR018,
  author       = {Mohsen Imani and
                  Mohammad Saidur Rahman and
                  Matthew Wright},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Adversarial Traces for Website Fingerprinting Defense},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2225--2227},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3278493},
  doi          = {10.1145/3243734.3278493},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ImaniR018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BartonWMI18,
  author       = {Armon Barton and
                  Matthew Wright and
                  Jiang Ming and
                  Mohsen Imani},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Towards Predicting Efficient and Anonymous Tor Circuits},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {429--444},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/barton},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BartonWMI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-02265,
  author       = {Payap Sirinam and
                  Mohsen Imani and
                  Marc Juarez and
                  Matthew Wright},
  title        = {Deep Fingerprinting: Undermining Website Fingerprinting Defenses with
                  Deep Learning},
  journal      = {CoRR},
  volume       = {abs/1801.02265},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.02265},
  eprinttype    = {arXiv},
  eprint       = {1801.02265},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-02265.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-01977,
  author       = {Armon Barton and
                  Mohsen Imani and
                  Jiang Ming and
                  Matthew Wright},
  title        = {Towards Predicting Efficient and Anonymous Tor Circuits},
  journal      = {CoRR},
  volume       = {abs/1805.01977},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.01977},
  eprinttype    = {arXiv},
  eprint       = {1805.01977},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-01977.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HoW17,
  author       = {Jun{-}Won Ho and
                  Matthew K. Wright},
  title        = {Distributed Detection of Sensor Worms Using Sequential Analysis and
                  Remote Software Attestations},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {680--695},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2648853},
  doi          = {10.1109/ACCESS.2017.2648853},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HoW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iwc/Al-AmeenW17,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  Matthew K. Wright},
  title        = {Exploring the Potential of GeoPass: {A} Geographic Location-Password
                  Scheme},
  journal      = {Interact. Comput.},
  volume       = {29},
  number       = {4},
  pages        = {605--627},
  year         = {2017},
  url          = {https://doi.org/10.1093/iwc/iww033},
  doi          = {10.1093/IWC/IWW033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iwc/Al-AmeenW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/PodolankoPMDW17,
  author       = {John P. Podolanko and
                  Revanth Pobala and
                  Hussain Mucklai and
                  George Danezis and
                  Matthew Wright},
  title        = {LiLAC: Lightweight Low-Latency Anonymous Chat},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {141--151},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.14},
  doi          = {10.1109/PAC.2017.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/PodolankoPMDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/MarneAW17,
  author       = {Sonali Tukaram Marne and
                  Mahdi Nasrullah Al{-}Ameen and
                  Matthew K. Wright},
  title        = {Learning System-assigned Passwords: {A} Preliminary Study on the People
                  with Learning Disabilities},
  booktitle    = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017,
                  Santa Clara, CA, USA, July 12-14, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/soups2017/workshop-program/wips2017/marne},
  timestamp    = {Wed, 19 Jul 2017 17:13:43 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/MarneAW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LevineLLW17,
  author       = {Brian Neil Levine and
                  Marc Liberatore and
                  Brian Lynn and
                  Matthew Wright},
  editor       = {Jos{\'{e}} M. del {\'{A}}lamo and
                  Seda F. G{\"{u}}rses and
                  Anupam Datta},
  title        = {Statistical Detection of Downloaders in Freenet},
  booktitle    = {Proceedings of the 3rd International Workshop on Privacy Engineering
                  co-located with 38th {IEEE} Symposium on Security and Privacy, IWPE@SP
                  2017, San Jose, CA, USA, May 25, 2017},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1873},
  pages        = {25--32},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-1873/IWPE17\_paper\_12.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:55 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LevineLLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ImaniBW17,
  author       = {Mohsen Imani and
                  Armon Barton and
                  Matthew Wright},
  title        = {Forming Guard Sets using {AS} Relationships},
  journal      = {CoRR},
  volume       = {abs/1706.05592},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.05592},
  eprinttype    = {arXiv},
  eprint       = {1706.05592},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/ImaniBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ImaniAW17,
  author       = {Mohsen Imani and
                  Mehrdad Amirabadi and
                  Matthew Wright},
  title        = {The Evaluation of Circuit Selection Methods on Tor},
  journal      = {CoRR},
  volume       = {abs/1706.06457},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.06457},
  eprinttype    = {arXiv},
  eprint       = {1706.06457},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/ImaniAW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Al-AmeenHW16,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  S. M. Taiabul Haque and
                  Matthew K. Wright},
  title        = {Leveraging autobiographical memory for two-factor online authentication},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {386--399},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2016-0005},
  doi          = {10.1108/ICS-01-2016-0005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Al-AmeenHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Al-AmeenW16,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  Matthew K. Wright},
  title        = {iPersea: Towards improving the Sybil-resilience of social {DHT}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {71},
  pages        = {1--10},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.05.014},
  doi          = {10.1016/J.JNCA.2016.05.014},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/Al-AmeenW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BartonW16,
  author       = {Armon Barton and
                  Matthew Wright},
  title        = {DeNASA: Destination-Naive AS-Awareness in Anonymous Communications},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {4},
  pages        = {356--372},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0044},
  doi          = {10.1515/POPETS-2016-0044},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/BartonW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AsudehW16,
  author       = {Omid Asudeh and
                  Matthew Wright},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {{POSTER:} Phishing Website Detection with a Multiphase Framework to
                  Find Visual Similarity},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1790--1792},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2989050},
  doi          = {10.1145/2976749.2989050},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AsudehW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JuarezIPDW16,
  author       = {Marc Juarez and
                  Mohsen Imani and
                  Mike Perry and
                  Claudia D{\'{\i}}az and
                  Matthew Wright},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Toward an Efficient Website Fingerprinting Defense},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {27--46},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_2},
  doi          = {10.1007/978-3-319-45744-4\_2},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JuarezIPDW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iot/ChoiJKLHW16,
  author       = {Miri Choi and
                  Jaewon Jang and
                  Yeeji Kwon and
                  Subeen Lim and
                  Jun{-}Won Ho and
                  Matthew K. Wright},
  editor       = {Stefan Schneegass and
                  Albrecht Schmidt and
                  Florian Michahelles and
                  Mareike Kritzler and
                  Alexander Ilic and
                  Kai Kunze},
  title        = {Split-Pipeline Model for Worm Propagation over IoT},
  booktitle    = {Proceedings of the 6th International Conference on the Internet of
                  Things, {IOT} 2016, Stuttgart, Germany, November 7-9, 2016},
  pages        = {155--156},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2998467},
  timestamp    = {Tue, 06 Nov 2018 16:59:08 +0100},
  biburl       = {https://dblp.org/rec/conf/iot/ChoiJKLHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ImaniAW16,
  author       = {Mohsen Imani and
                  Mehrdad Amirabadi and
                  Matthew Wright},
  title        = {Modified Relay Selection and Circuit Selection for Faster Tor},
  journal      = {CoRR},
  volume       = {abs/1608.07343},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.07343},
  eprinttype    = {arXiv},
  eprint       = {1608.07343},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/ImaniAW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuGWM15,
  author       = {Changchang Liu and
                  Peng Gao and
                  Matthew K. Wright and
                  Prateek Mittal},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Exploiting Temporal Dynamics in Sybil Defenses},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {805--816},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813693},
  doi          = {10.1145/2810103.2813693},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuGWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/Al-AmeenWS15,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  Matthew K. Wright and
                  Shannon Scielzo},
  editor       = {Bo Begole and
                  Jinwoo Kim and
                  Kori Inkpen and
                  Woontack Woo},
  title        = {Towards Making Random Passwords Memorable: Leveraging Users' Cognitive
                  Ability Through Multiple Cues},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in
                  Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23,
                  2015},
  pages        = {2315--2324},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2702123.2702241},
  doi          = {10.1145/2702123.2702241},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/Al-AmeenWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Al-AmeenFWS15,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  Kanis Fatema and
                  Matthew K. Wright and
                  Shannon Scielzo},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Leveraging Real-Life Facts to Make Random Passwords More Memorable},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {438--455},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_22},
  doi          = {10.1007/978-3-319-24177-7\_22},
  timestamp    = {Sat, 19 Oct 2019 20:00:24 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Al-AmeenFWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/Al-AmeenFWS15,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  Kanis Fatema and
                  Matthew K. Wright and
                  Shannon Scielzo},
  editor       = {Lorrie Faith Cranor and
                  Robert Biddle and
                  Sunny Consolvo},
  title        = {The Impact of Cues and User Interaction on the Memorability of System-Assigned
                  Recognition-Based Graphical Passwords},
  booktitle    = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa,
                  Canada, July 22-24, 2015},
  pages        = {185--196},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/soups2015/proceedings/presentation/al-ameen},
  timestamp    = {Wed, 05 Apr 2017 12:53:50 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/Al-AmeenFWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Al-AmeenWS15,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  Matthew K. Wright and
                  Shannon Scielzo},
  title        = {Towards Making Random Passwords Memorable: Leveraging Users' Cognitive
                  Ability Through Multiple Cues},
  journal      = {CoRR},
  volume       = {abs/1503.02314},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.02314},
  eprinttype    = {arXiv},
  eprint       = {1503.02314},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Al-AmeenWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JuarezIPDW15,
  author       = {Marc Juarez and
                  Mohsen Imani and
                  Mike Perry and
                  Claudia D{\'{\i}}az and
                  Matthew Wright},
  title        = {{WTF-PAD:} Toward an Efficient Website Fingerprinting Defense for
                  Tor},
  journal      = {CoRR},
  volume       = {abs/1512.00524},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.00524},
  eprinttype    = {arXiv},
  eprint       = {1512.00524},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JuarezIPDW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LinHWK14,
  author       = {Ying{-}Dar Lin and
                  Chun{-}Ying Huang and
                  Matthew K. Wright and
                  Georgios Kambourakis},
  title        = {Mobile Application Security},
  journal      = {Computer},
  volume       = {47},
  number       = {6},
  pages        = {21--23},
  year         = {2014},
  url          = {https://doi.org/10.1109/MC.2014.156},
  doi          = {10.1109/MC.2014.156},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LinHWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/HaqueWS14,
  author       = {S. M. Taiabul Haque and
                  Matthew K. Wright and
                  Shannon Scielzo},
  title        = {Hierarchy of users' web passwords: Perceptions, practices and susceptibilities},
  journal      = {Int. J. Hum. Comput. Stud.},
  volume       = {72},
  number       = {12},
  pages        = {860--874},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijhcs.2014.07.007},
  doi          = {10.1016/J.IJHCS.2014.07.007},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmms/HaqueWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/RajLLWD14,
  author       = {Mayank Raj and
                  Na Li and
                  Donggang Liu and
                  Matthew K. Wright and
                  Sajal K. Das},
  title        = {Using data mules to preserve source location privacy in Wireless Sensor
                  Networks},
  journal      = {Pervasive Mob. Comput.},
  volume       = {11},
  pages        = {244--260},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.pmcj.2012.10.002},
  doi          = {10.1016/J.PMCJ.2012.10.002},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/RajLLWD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/AkavipatAKRSW14,
  author       = {Ruj Akavipat and
                  Mahdi N. Al{-}Ameen and
                  Apu Kapadia and
                  Zahid Rahman and
                  Roman Schlegel and
                  Matthew K. Wright},
  title        = {ReDS: {A} Framework for Reputation-Enhanced DHTs},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {25},
  number       = {2},
  pages        = {321--331},
  year         = {2014},
  url          = {https://doi.org/10.1109/TPDS.2013.231},
  doi          = {10.1109/TPDS.2013.231},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/AkavipatAKRSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Al-AmeenW14,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  Matthew K. Wright},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Design and evaluation of persea, a sybil-resistant {DHT}},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590326},
  doi          = {10.1145/2590296.2590326},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Al-AmeenW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/SankeyW14,
  author       = {Jody Sankey and
                  Matthew K. Wright},
  editor       = {Emiliano De Cristofaro and
                  Steven J. Murdoch},
  title        = {Dovetail: Stronger Anonymity in Next-Generation Internet Routing},
  booktitle    = {Privacy Enhancing Technologies - 14th International Symposium, {PETS}
                  2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8555},
  pages        = {283--303},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08506-7\_15},
  doi          = {10.1007/978-3-319-08506-7\_15},
  timestamp    = {Sat, 09 Apr 2022 12:39:29 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/SankeyW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/HaqueSW14,
  author       = {S. M. Taiabul Haque and
                  Shannon Scielzo and
                  Matthew K. Wright},
  editor       = {Lorrie Faith Cranor and
                  Lujo Bauer and
                  Robert Biddle},
  title        = {Applying Psychometrics to Measure User Comfort when Constructing a
                  Strong Password},
  booktitle    = {Tenth Symposium on Usable Privacy and Security, {SOUPS} 2014, Menlo
                  Park, CA, USA, July 9-11, 2014},
  pages        = {231--242},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/soups2014/proceedings/presentation/haque},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/HaqueSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RahmanWL14,
  author       = {Nabila Rahman and
                  Matthew K. Wright and
                  Donggang Liu},
  title        = {Fast and energy-efficient technique for jammed region mapping in wireless
                  sensor networks},
  journal      = {CoRR},
  volume       = {abs/1401.7002},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.7002},
  eprinttype    = {arXiv},
  eprint       = {1401.7002},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RahmanWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SankeyW14,
  author       = {Jody Sankey and
                  Matthew K. Wright},
  title        = {Dovetail: Stronger Anonymity in Next-Generation Internet Routing},
  journal      = {CoRR},
  volume       = {abs/1405.0351},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.0351},
  eprinttype    = {arXiv},
  eprint       = {1405.0351},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SankeyW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Al-AmeenHW14,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  S. M. Taiabul Haque and
                  Matthew K. Wright},
  title        = {{Q-A:} Towards the Solution of Usability-Security Tension in User
                  Authentication},
  journal      = {CoRR},
  volume       = {abs/1407.7277},
  year         = {2014},
  url          = {http://arxiv.org/abs/1407.7277},
  eprinttype    = {arXiv},
  eprint       = {1407.7277},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Al-AmeenHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Al-AmeenW14,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  Matthew K. Wright},
  title        = {A Comprehensive Study of the GeoPass User Authentication Scheme},
  journal      = {CoRR},
  volume       = {abs/1408.2852},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.2852},
  eprinttype    = {arXiv},
  eprint       = {1408.2852},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Al-AmeenW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Al-AmeenW14a,
  author       = {Mahdi Nasrullah Al{-}Ameen and
                  Matthew K. Wright},
  title        = {iPersea : The Improved Persea with Sybil Detection Mechanism},
  journal      = {CoRR},
  volume       = {abs/1412.6883},
  year         = {2014},
  url          = {http://arxiv.org/abs/1412.6883},
  eprinttype    = {arXiv},
  eprint       = {1412.6883},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Al-AmeenW14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KothariW13,
  author       = {Kush Kothari and
                  Matthew K. Wright},
  title        = {Mimic: An active covert channel that evades regularity-based detection},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {3},
  pages        = {647--657},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2012.10.008},
  doi          = {10.1016/J.COMNET.2012.10.008},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/KothariW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/DongLW13,
  author       = {Qi Dong and
                  Donggang Liu and
                  Matthew K. Wright},
  title        = {Mitigating jamming attacks in wireless broadcast systems},
  journal      = {Wirel. Networks},
  volume       = {19},
  number       = {8},
  pages        = {1867--1880},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11276-013-0574-0},
  doi          = {10.1007/S11276-013-0574-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/DongLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaqueWS13,
  author       = {S. M. Taiabul Haque and
                  Matthew K. Wright and
                  Shannon Scielzo},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {Passwords and interfaces: towards creating stronger passwords by using
                  mobile phone handsets},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {105--110},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516767},
  doi          = {10.1145/2516760.2516767},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaqueWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Al-AmeenW13,
  author       = {Mahdi N. Al{-}Ameen and
                  Matthew K. Wright},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {Persea: a sybil-resistant social {DHT}},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {169--172},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435372},
  doi          = {10.1145/2435349.2435372},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/Al-AmeenW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HaqueWS13,
  author       = {S. M. Taiabul Haque and
                  Matthew K. Wright and
                  Shannon Scielzo},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {A study of user password strategy for multiple accounts},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {173--176},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435373},
  doi          = {10.1145/2435349.2435373},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/HaqueWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MittalWB13,
  author       = {Prateek Mittal and
                  Matthew K. Wright and
                  Nikita Borisov},
  title        = {Pisces: Anonymous Communication Using Social Networks},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  pages        = {1--18},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/pisces-anonymous-communication-using-social-networks},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MittalWB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pet/2013,
  editor       = {Emiliano De Cristofaro and
                  Matthew K. Wright},
  title        = {Privacy Enhancing Technologies - 13th International Symposium, {PETS}
                  2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7981},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39077-7},
  doi          = {10.1007/978-3-642-39077-7},
  isbn         = {978-3-642-39076-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/HoWD12,
  author       = {Jun{-}Won Ho and
                  Matthew K. Wright and
                  Sajal K. Das},
  title        = {Distributed detection of mobile malicious node attacks in wireless
                  sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {10},
  number       = {3},
  pages        = {512--523},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.adhoc.2011.09.006},
  doi          = {10.1016/J.ADHOC.2011.09.006},
  timestamp    = {Tue, 10 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/HoWD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Al-AmeenGW12,
  author       = {Mahdi N. Al{-}Ameen and
                  Charles Gatz and
                  Matthew K. Wright},
  title        = {{SDA-2H:} Understanding the Value of Background Cover Against Statistical
                  Disclosure},
  journal      = {J. Networks},
  volume       = {7},
  number       = {12},
  pages        = {1943--1951},
  year         = {2012},
  url          = {https://doi.org/10.4304/jnw.7.12.1943-1951},
  doi          = {10.4304/JNW.7.12.1943-1951},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Al-AmeenGW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HoWD12,
  author       = {Jun{-}Won Ho and
                  Matthew K. Wright and
                  Sajal K. Das},
  title        = {ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation
                  in Wireless Sensor Networks Using Sequential Hypothesis Testing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {494--511},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.65},
  doi          = {10.1109/TDSC.2011.65},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HoWD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/MehtaLW12,
  author       = {Kiran Mehta and
                  Donggang Liu and
                  Matthew K. Wright},
  title        = {Protecting Location Privacy in Sensor Networks against a Global Eavesdropper},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {320--336},
  year         = {2012},
  url          = {https://doi.org/10.1109/TMC.2011.32},
  doi          = {10.1109/TMC.2011.32},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/MehtaLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/SiddhabathulaDLW12,
  author       = {Kartik Siddhabathula and
                  Qi Dong and
                  Donggang Liu and
                  Matthew K. Wright},
  title        = {Fast jamming detection in sensor networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {934--938},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6363672},
  doi          = {10.1109/ICC.2012.6363672},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/SiddhabathulaDLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/LiRLWD12,
  author       = {Na Li and
                  Mayank Raj and
                  Donggang Liu and
                  Matthew K. Wright and
                  Sajal K. Das},
  editor       = {Luciano Bononi and
                  Ajoy Kumar Datta and
                  St{\'{e}}phane Devismes and
                  Archan Misra},
  title        = {Using Data Mules to Preserve Source Location Privacy in Wireless Sensor
                  Networks},
  booktitle    = {Distributed Computing and Networking - 13th International Conference,
                  {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7129},
  pages        = {309--324},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-25959-3\_23},
  doi          = {10.1007/978-3-642-25959-3\_23},
  timestamp    = {Mon, 26 Jun 2023 20:44:19 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/LiRLWD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/SadiqKW12,
  author       = {Umair Sadiq and
                  Mohan Kumar and
                  Matthew K. Wright},
  editor       = {Albert Y. Zomaya and
                  Bj{\"{o}}rn Landfeldt and
                  Ravi Prakash},
  title        = {{CRISP:} collusion-resistant incentive-compatible routing and forwarding
                  in opportunistic networks},
  booktitle    = {The 15th {ACM} International Conference on Modeling, Analysis and
                  Simulation of Wireless and Mobile Systems, MSWiM '12, Paphos, Cyprus,
                  October 21-25, 2012},
  pages        = {69--78},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2387238.2387253},
  doi          = {10.1145/2387238.2387253},
  timestamp    = {Wed, 22 Mar 2023 16:53:34 +0100},
  biburl       = {https://dblp.org/rec/conf/mswim/SadiqKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pet/2012,
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Matthew K. Wright},
  title        = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
                  2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31680-7},
  doi          = {10.1007/978-3-642-31680-7},
  isbn         = {978-3-642-31679-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-6326,
  author       = {Prateek Mittal and
                  Matthew K. Wright and
                  Nikita Borisov},
  title        = {Pisces: Anonymous Communication Using Social Networks},
  journal      = {CoRR},
  volume       = {abs/1208.6326},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.6326},
  eprinttype    = {arXiv},
  eprint       = {1208.6326},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-6326.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-4867,
  author       = {Ruj Akavipat and
                  Mahdi N. Al{-}Ameen and
                  Apu Kapadia and
                  Zahid Rahman and
                  Roman Schlegel and
                  Matthew K. Wright},
  title        = {ReDS: {A} Framework for Reputation-Enhanced DHTs},
  journal      = {CoRR},
  volume       = {abs/1209.4867},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.4867},
  eprinttype    = {arXiv},
  eprint       = {1209.4867},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-4867.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WallsKW11,
  author       = {Robert J. Walls and
                  Kush Kothari and
                  Matthew K. Wright},
  title        = {Liquid: {A} detection-resistant covert timing channel based on {IPD}
                  shaping},
  journal      = {Comput. Networks},
  volume       = {55},
  number       = {6},
  pages        = {1217--1228},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comnet.2010.11.007},
  doi          = {10.1016/J.COMNET.2010.11.007},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/WallsKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MalleshW11,
  author       = {Nayantara Mallesh and
                  Matthew K. Wright},
  title        = {An analysis of the statistical disclosure attack and receiver-bound
                  cover},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {8},
  pages        = {597--612},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2011.08.011},
  doi          = {10.1016/J.COSE.2011.08.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MalleshW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/MargolinLMW11,
  author       = {N. Boris Margolin and
                  Brian Neil Levine and
                  James D. Miller and
                  Matthew K. Wright},
  title        = {Economic incentives for protecting digital rights online},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {10},
  number       = {5},
  pages        = {553--564},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.elerap.2010.12.006},
  doi          = {10.1016/J.ELERAP.2010.12.006},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/MargolinLMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiberatoreGLW11,
  author       = {Marc Liberatore and
                  Bikas Gurung and
                  Brian Neil Levine and
                  Matthew K. Wright},
  title        = {Empirical tests of anonymous voice over {IP}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {34},
  number       = {1},
  pages        = {341--350},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jnca.2010.06.009},
  doi          = {10.1016/J.JNCA.2010.06.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiberatoreGLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/VakdeBLW11,
  author       = {Gauri Vakde and
                  Radhika Bibikar and
                  Zhengyi Le and
                  Matthew K. Wright},
  title        = {EnPassant: anonymous routing for disruption-tolerant networks with
                  applications in assistive environments},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {11},
  pages        = {1243--1256},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.246},
  doi          = {10.1002/SEC.246},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/VakdeBLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/HoWD11,
  author       = {Jun{-}Won Ho and
                  Matthew K. Wright and
                  Sajal K. Das},
  title        = {Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks
                  Using Sequential Hypothesis Testing},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {10},
  number       = {6},
  pages        = {767--782},
  year         = {2011},
  url          = {https://doi.org/10.1109/TMC.2010.213},
  doi          = {10.1109/TMC.2010.213},
  timestamp    = {Tue, 10 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/HoWD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MalleshW11,
  author       = {Nayantara Mallesh and
                  Matthew K. Wright},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: shaping network topology for privacy and performance},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {813--816},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093500},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MalleshW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1109-6874,
  author       = {Dustin Bachrach and
                  Christopher Nunu and
                  Dan S. Wallach and
                  Matthew K. Wright},
  title        = {{\#}h00t: Censorship Resistant Microblogging},
  journal      = {CoRR},
  volume       = {abs/1109.6874},
  year         = {2011},
  url          = {http://arxiv.org/abs/1109.6874},
  eprinttype    = {arXiv},
  eprint       = {1109.6874},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1109-6874.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PadhyeKVW10,
  author       = {Jaideep D. Padhye and
                  Kush Kothari and
                  Madhu Venkateshaiah and
                  Matthew K. Wright},
  title        = {Evading stepping-stone detection under the cloak of streaming media
                  with {SNEAK}},
  journal      = {Comput. Networks},
  volume       = {54},
  number       = {13},
  pages        = {2310--2325},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comnet.2010.03.011},
  doi          = {10.1016/J.COMNET.2010.03.011},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/PadhyeKVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npa/KhanMNW10,
  author       = {Safwan Mahmud Khan and
                  Nayantara Mallesh and
                  Arjun Nambiar and
                  Matthew K. Wright},
  title        = {The Dynamics of Salsa: {A} Robust Structured {P2P} System},
  journal      = {Netw. Protoc. Algorithms},
  volume       = {2},
  number       = {4},
  pages        = {40--60},
  year         = {2010},
  url          = {https://doi.org/10.5296/npa.v2i4.474},
  doi          = {10.5296/NPA.V2I4.474},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npa/KhanMNW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KrishnamoorthyW10,
  author       = {Pranav Krishnamoorthy and
                  Matthew K. Wright},
  editor       = {Rachel Greenstadt},
  title        = {Towards modeling the behavior of physical intruders in a region monitored
                  by a wireless sensor network},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866425},
  doi          = {10.1145/1866423.1866425},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KrishnamoorthyW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AkavipatDK010,
  author       = {Ruj Akavipat and
                  Apurv Dhadphale and
                  Apu Kapadia and
                  Matthew Wright},
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {ReDS: reputation for directory services in {P2P} systems},
  booktitle    = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  pages        = {47--54},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886.1866896},
  doi          = {10.1145/1866886.1866896},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AkavipatDK010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WrightKKD10,
  author       = {Matthew K. Wright and
                  Apu Kapadia and
                  Mohan Kumar and
                  Apurv Dhadphale},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {ReDS: reputation for directory services in {P2P} systems},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {71},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852747},
  doi          = {10.1145/1852666.1852747},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WrightKKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AbrahamW10,
  author       = {Titus Abraham and
                  Matthew K. Wright},
  title        = {Selective Cross Correlation in Passive Timing Analysis Attacks against
                  Low-Latency Mixes},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5684247},
  doi          = {10.1109/GLOCOM.2010.5684247},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/AbrahamW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MalleshW10,
  author       = {Nayantara Mallesh and
                  Matthew K. Wright},
  editor       = {Rainer B{\"{o}}hme and
                  Philip W. L. Fong and
                  Reihaneh Safavi{-}Naini},
  title        = {The Reverse Statistical Disclosure Attack},
  booktitle    = {Information Hiding - 12th International Conference, {IH} 2010, Calgary,
                  AB, Canada, June 28-30, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6387},
  pages        = {221--234},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16435-4\_17},
  doi          = {10.1007/978-3-642-16435-4\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MalleshW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/LagesseKW10,
  author       = {Brent Lagesse and
                  Mohan Kumar and
                  Matthew K. Wright},
  title        = {ReSCo: {A} middleware component for Reliable Service Composition in
                  pervasive systems},
  booktitle    = {Eigth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim,
                  Germany, Workshop Proceedings},
  pages        = {486--491},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/PERCOMW.2010.5470620},
  doi          = {10.1109/PERCOMW.2010.5470620},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/LagesseKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/HoLWD09,
  author       = {Jun{-}Won Ho and
                  Donggang Liu and
                  Matthew K. Wright and
                  Sajal K. Das},
  title        = {Distributed detection of replica node attacks with group deployment
                  knowledge in wireless sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {8},
  pages        = {1476--1488},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2009.04.008},
  doi          = {10.1016/J.ADHOC.2009.04.008},
  timestamp    = {Tue, 10 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/HoLWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HoWD09,
  author       = {Jun{-}Won Ho and
                  Matthew K. Wright and
                  Sajal K. Das},
  title        = {Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using
                  Sequential Analysis},
  booktitle    = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  19-25 April 2009, Rio de Janeiro, Brazil},
  pages        = {1773--1781},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INFCOM.2009.5062097},
  doi          = {10.1109/INFCOM.2009.5062097},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HoWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/HoLWD09,
  author       = {Jun{-}Won Ho and
                  Donggang Liu and
                  Matthew K. Wright and
                  Sajal K. Das},
  title        = {Distributed Detection of Replicas with Deployment Knowledge in Wireless
                  Sensor Networks},
  booktitle    = {Seventh Annual {IEEE} International Conference on Pervasive Computing
                  and Communications - Workshops (PerCom Workshops 2009), 9-13 March
                  2009, Galveston, TX, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/PERCOM.2009.4912865},
  doi          = {10.1109/PERCOM.2009.4912865},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/HoLWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/LagesseKPW09,
  author       = {Brent Lagesse and
                  Mohan Kumar and
                  Justin Mazzola Paluska and
                  Matthew K. Wright},
  title        = {{DTT:} {A} Distributed Trust Toolkit for Pervasive Systems},
  booktitle    = {Seventh Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2009, 9-13 March 2009, Galveston, TX, {USA}},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/PERCOM.2009.4912754},
  doi          = {10.1109/PERCOM.2009.4912754},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/LagesseKPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/petra/LeVW09,
  author       = {Zhengyi Le and
                  Gauri Vakde and
                  Matthew K. Wright},
  title        = {{PEON:} privacy-enhanced opportunistic networks with applications
                  in assistive environments},
  booktitle    = {Proceedings of the 2nd International Conference on Pervasive Technologies
                  Related to Assistive Environments, {PETRA} 2009, Corfu, Greece, June
                  9-13, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1579114.1579190},
  doi          = {10.1145/1579114.1579190},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/petra/LeVW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/HoWD09,
  author       = {Jun{-}Won Ho and
                  Matthew K. Wright and
                  Sajal K. Das},
  title        = {ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation
                  in Sensor Networks Using Sequential Analysis},
  booktitle    = {28th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2009),
                  Niagara Falls, New York, USA, September 27-30, 2009},
  pages        = {217--223},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SRDS.2009.23},
  doi          = {10.1109/SRDS.2009.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/HoWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WrightALS08,
  author       = {Matthew K. Wright and
                  Micah Adler and
                  Brian Neil Levine and
                  Clay Shields},
  title        = {Passive-Logging Attacks Against Anonymous Communications Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {3:1--3:34},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330332.1330335},
  doi          = {10.1145/1330332.1330335},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WrightALS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/LagesseKW08,
  author       = {Brent Lagesse and
                  Mohan Kumar and
                  Matthew K. Wright},
  editor       = {Klaus Wehrle and
                  Wolfgang Kellerer and
                  Sandeep K. Singhal and
                  Ralf Steinmetz},
  title        = {{AREX:} An Adaptive System for Secure Resource Access in Mobile {P2P}
                  Systems},
  booktitle    = {Proceedings P2P'08, Eighth International Conference on Peer-to-Peer
                  Computing, 8-11 September 2008, Aachen, Germany},
  pages        = {43--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/P2P.2008.46},
  doi          = {10.1109/P2P.2008.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/p2p/LagesseKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DaginawalaW08,
  author       = {Hatim Daginawala and
                  Matthew K. Wright},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {Studying Timing Analysis on the Internet with SubRosa},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {133--150},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_9},
  doi          = {10.1007/978-3-540-70630-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DaginawalaW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MalleshW07,
  author       = {Nayantara Mallesh and
                  Matthew K. Wright},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Countering Statistical Disclosure with Receiver-Bound Cover Traffic},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {547--562},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_36},
  doi          = {10.1007/978-3-540-74835-9\_36},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MalleshW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/MehtaLW07,
  author       = {Kiran Mehta and
                  Donggang Liu and
                  Matthew K. Wright},
  title        = {Location Privacy in Sensor Networks Against a Global Eavesdropper},
  booktitle    = {Proceedings of the {IEEE} International Conference on Network Protocols,
                  {ICNP} 2007, October 16-19, 2007, Beijing, China},
  pages        = {314--323},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNP.2007.4375862},
  doi          = {10.1109/ICNP.2007.4375862},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/MehtaLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NambiarW06,
  author       = {Arjun Nambiar and
                  Matthew K. Wright},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Salsa: a structured approach to large-scale anonymity},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {17--26},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180409},
  doi          = {10.1145/1180405.1180409},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NambiarW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ReiterWW05,
  author       = {Michael K. Reiter and
                  XiaoFeng Wang and
                  Matthew K. Wright},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Building Reliable Mix Networks with Fair Exchange},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {378--392},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_26},
  doi          = {10.1007/11496137\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ReiterWW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WrightALS04,
  author       = {Matthew K. Wright and
                  Micah Adler and
                  Brian Neil Levine and
                  Clay Shields},
  title        = {The predecessor attack: An analysis of a threat to anonymous communications
                  systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {489--522},
  year         = {2004},
  url          = {https://doi.org/10.1145/1042031.1042032},
  doi          = {10.1145/1042031.1042032},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WrightALS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MargolinWL04,
  author       = {N. Boris Margolin and
                  Matthew K. Wright and
                  Brian Neil Levine},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Analysis of an incentives-based secrets protection system},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {22--30},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029153},
  doi          = {10.1145/1029146.1029153},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/MargolinWL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LevineRWW04,
  author       = {Brian Neil Levine and
                  Michael K. Reiter and
                  Chenxi Wang and
                  Matthew K. Wright},
  editor       = {Ari Juels},
  title        = {Timing Attacks in Low-Latency Mix Systems (Extended Abstract)},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {251--265},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_25},
  doi          = {10.1007/978-3-540-27809-2\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/LevineRWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WrightALS03,
  author       = {Matthew K. Wright and
                  Micah Adler and
                  Brian Neil Levine and
                  Clay Shields},
  title        = {Defending Anonymous Communications Against Passive Logging Attack},
  booktitle    = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
                  May 2003, Berkeley, CA, {USA}},
  pages        = {28--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199325},
  doi          = {10.1109/SECPRI.2003.1199325},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WrightALS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WrightALS02,
  author       = {Matthew K. Wright and
                  Micah Adler and
                  Brian Neil Levine and
                  Clay Shields},
  title        = {An Analysis of the Degradation of Anonymous Protocols},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2002, San Diego, California, {USA}},
  pages        = {1--12},
  publisher    = {The Internet Society},
  year         = {2002},
  url          = {https://www.ndss-symposium.org/ndss2002/analysis-degradation-anonymous-protocols/},
  timestamp    = {Mon, 01 Feb 2021 08:42:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WrightALS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics