default search action
Brian Neil Levine
Person information
- affiliation: University of Massachusetts Amherst, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c75]Prasanna Lakkur Subramanyam, Mohit Iyyer, Brian Neil Levine:
Triage of Messages and Conversations in a Large-Scale Child Victimization Corpus. WWW 2024: 4544-4554 - 2020
- [c74]Brian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright:
A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet. CCS 2020: 1497-1512 - [c73]Keen Sung, Jianyi Huang, Mark D. Corner, Brian Neil Levine:
Re-identification of mobile devices using real-time bidding advertising networks. MobiCom 2020: 48:1-48:13 - [c72]George Bissias, Brian Neil Levine:
Bobtail: Improved Blockchain Security with Low-Variance Mining. NDSS 2020 - [c71]Keen Sung, Brian Neil Levine, Mariya Zheleva:
Protecting location privacy from untrusted wireless service providers. WISEC 2020: 266-277 - [i10]Keen Sung, Brian Neil Levine, Mariya Zheleva:
ZipPhone: Protecting user location privacy from cellular service providers. CoRR abs/2002.04731 (2020) - [i9]George Bissias, Rainer Böhme, David Thibodeau, Brian Neil Levine:
Pricing Security in Proof-of-Work Systems. CoRR abs/2012.03706 (2020)
2010 – 2019
- 2019
- [j21]Keen Sung, Joydeep Biswas, Erik G. Learned-Miller, Brian Neil Levine, Marc Liberatore:
Server-Side Traffic Analysis Reveals Mobile Location Information over the Internet. IEEE Trans. Mob. Comput. 18(6): 1407-1418 (2019) - [c70]George Bissias, David Thibodeau, Brian Neil Levine:
Bonded Mining: Difficulty Adjustment by Miner Commitment. DPM/CBT@ESORICS 2019: 372-390 - [c69]A. Pinar Ozisik, Gavin Andresen, Brian Neil Levine, Darren Tapp, George Bissias, Sunny Katkuri:
Graphene: efficient interactive set reconciliation applied to blockchain propagation. SIGCOMM 2019: 303-317 - [i8]George Bissias, Brian Neil Levine, David Thibodeau:
Bonded Mining: Difficulty Adjustment by Miner Commitment. CoRR abs/1907.00302 (2019) - [i7]George Bissias, Brian Neil Levine, David Thibodeau:
Greedy but Cautious: Conditions for Miner Convergence to Resource Allocation Equilibrium. CoRR abs/1907.09883 (2019) - 2018
- [c68]George Bissias, Brian Neil Levine, David Thibodeau:
Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies. DPM/CBT@ESORICS 2018: 155-172 - [c67]Mark D. Corner, Brian Neil Levine:
MicroMobile: Leveraging Mobile Advertising for Large-Scale Experimentation. MobiSys 2018: 310-322 - [r2]Brian Neil Levine, Gerome Miklau:
Auditing and Forensic Analysis. Encyclopedia of Database Systems (2nd ed.) 2018 - [i6]George Bissias, Brian Neil Levine, David Thibodeau:
Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies. CoRR abs/1806.07189 (2018) - 2017
- [j20]George Bissias, Brian Neil Levine, Marc Liberatore, Swagatika Prusty:
Forensic Identification of Anonymous Sources in OneSwarm. IEEE Trans. Dependable Secur. Comput. 14(6): 620-632 (2017) - [c66]A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, Brian Neil Levine:
Graphene: A New Protocol for Block Propagation Using Set Reconciliation. DPM/CBT@ESORICS 2017: 420-428 - [c65]Mark D. Corner, Brian Neil Levine, Omar Ismail, Angela Upreti:
Advertising-based Measurement: A Platform of 7 Billion Mobile Devices. MobiCom 2017: 435-447 - [c64]George Bissias, Brian Neil Levine, Nikunj Kapadia:
Market-based Security for Distributed Applications. NSPW 2017: 19-34 - [c63]Brian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright:
Statistical Detection of Downloaders in Freenet. IWPE@SP 2017: 25-32 - [i5]George Dean Bissias, Brian Neil Levine, Nikunj Kapadia:
Securing the Assets of Decentralized Applications using Financial Derivatives (DRAFT). CoRR abs/1701.03945 (2017) - [i4]A. Pinar Ozisik, Brian Neil Levine:
An Explanation of Nakamoto's Analysis of Double-spend Attacks. CoRR abs/1701.03977 (2017) - [i3]A. Pinar Ozisik, George Bissias, Brian Neil Levine:
Estimation of Miner Hash Rates and Consensus on Blockchains (draft). CoRR abs/1707.00082 (2017) - [i2]George Bissias, Brian Neil Levine:
Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance (Draft). CoRR abs/1709.08750 (2017) - 2016
- [i1]George Bissias, Brian Neil Levine, A. Pinar Ozisik, Gavin Andresen, Amir Houmansadr:
An Analysis of Attacks on Blockchain Consensus. CoRR abs/1610.07985 (2016) - 2015
- [c62]Robert J. Walls, Yuriy Brun, Marc Liberatore, Brian Neil Levine:
Discovering specification violations in networked software systems. ISSRE 2015: 496-506 - 2014
- [j19]Marc Liberatore, Brian Neil Levine, Clay Shields, Brian Lynn:
Efficient Tagging of Remote Peers during Child Pornography Investigations. IEEE Trans. Dependable Secur. Comput. 11(5): 425-439 (2014) - [c61]Saksham Varma, Robert J. Walls, Brian Lynn, Brian Neil Levine:
Efficient Smart Phone Forensics Based on Relevance Feedback. SPSM@CCS 2014: 81-91 - [c60]George Dean Bissias, A. Pinar Ozisik, Brian Neil Levine, Marc Liberatore:
Sybil-Resistant Mixing for Bitcoin. WPES 2014: 149-158 - 2013
- [c59]Sookhyun Yang, Jim Kurose, Brian Neil Levine:
Disambiguation of residential wired and wireless access in a forensic setting. INFOCOM 2013: 360-364 - [c58]Hamed Soroush, Keen Sung, Erik G. Learned-Miller, Brian Neil Levine, Marc Liberatore:
Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet. Privacy Enhancing Technologies 2013: 103-122 - [c57]Ryan Hurley, Swagatika Prusty, Hamed Soroush, Robert J. Walls, Jeannie R. Albrecht, Emmanuel Cecchet, Brian Neil Levine, Marc Liberatore, Brian Lynn, Janis Wolak:
Measurement and analysis of child pornography trafficking on P2P networks. WWW 2013: 631-642 - 2012
- [c56]Robert J. Walls, Shane S. Clark, Brian Neil Levine:
Functional Privacy or Why Cookies Are Better with Milk. HotSec 2012 - 2011
- [j18]N. Boris Margolin, Brian Neil Levine, James D. Miller, Matthew K. Wright:
Economic incentives for protecting digital rights online. Electron. Commer. Res. Appl. 10(5): 553-564 (2011) - [j17]Marc Liberatore, Bikas Gurung, Brian Neil Levine, Matthew K. Wright:
Empirical tests of anonymous voice over IP. J. Netw. Comput. Appl. 34(1): 341-350 (2011) - [j16]Hamed Soroush, Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine, Brian Lynn:
A retrospective look at the UMass DOME mobile testbed. ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(4): 2-15 (2011) - [c55]Swagatika Prusty, Brian Neil Levine, Marc Liberatore:
Forensic investigation of the OneSwarm anonymous filesharing system. CCS 2011: 201-214 - [c54]Hamed Soroush, Peter Gilbert, Nilanjan Banerjee, Brian Neil Levine, Mark D. Corner, Landon P. Cox:
Concurrent Wi-Fi for mobile users: analysis and measurements. CoNEXT 2011: 4 - [c53]Hamed Soroush, Peter Gilbert, Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine, Landon P. Cox:
Spider: improving mobile networking with concurrent wi-fi connections. SIGCOMM 2011: 402-403 - [c52]Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine:
Forensic Triage for Mobile Phones with DEC0DE. USENIX Security Symposium 2011 - [c51]Robert J. Walls, Brian Neil Levine, Marc Liberatore, Clay Shields:
Effective Digital Forensics Research Is Investigator-Centric. HotSec 2011 - [c50]Jim Partan, Jim Kurose, Brian Neil Levine, James C. Preisig:
Low spreading loss in underwater acoustic networks reduces RTS/CTS effectiveness. WUWNet 2011: 5 - [e2]Parmesh Ramanathan, Thyaga Nandagopal, Brian Neil Levine:
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, MOBICOM 2011, Las Vegas, Nevada, USA, September 19-23, 2011. ACM 2011, ISBN 978-1-4503-0492-4 [contents] - 2010
- [j15]Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine, Clay Shields:
Forensic investigation of peer-to-peer file sharing networks. Digit. Investig. 7(Supplement): S95-S103 (2010) - [j14]Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine:
Design and field experimentation of an energy-efficient architecture for DTN throwboxes. IEEE/ACM Trans. Netw. 18(2): 554-567 (2010) - [j13]Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani:
Replication routing in DTNs: a resource allocation approach. IEEE/ACM Trans. Netw. 18(2): 596-609 (2010) - [c49]John Tuttle, Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine:
Reverse engineering for mobile systems forensics with Ares. Insider Threats@CCS 2010: 21-28 - [c48]Marc Liberatore, Brian Neil Levine, Clay Shields:
Strengthening forensic investigations of child pornography on P2P networks. CoNEXT 2010: 19 - [c47]George Dean Bissias, Brian Neil Levine, Ramesh K. Sitaraman:
Assessing the vulnerability of replicated network services. CoNEXT 2010: 24
2000 – 2009
- 2009
- [j12]Brian Neil Levine, Marc Liberatore:
DEX: Digital evidence provenance supporting reproducibility and comparison. Digit. Investig. 6(Supplement): S48-S56 (2009) - [c46]Hamed Soroush, Nilanjan Banerjee, Aruna Balasubramanian, Mark D. Corner, Brian Neil Levine, Brian Lynn:
DOME: a diverse outdoor mobile testbed. HotPlanet@MobiSys 2009: 2 - [r1]Brian Neil Levine, Gerome Miklau:
Auditing and Forensic Analysis. Encyclopedia of Database Systems 2009: 172-176 - 2008
- [j11]Brendan Burns, Oliver Brock, Brian Neil Levine:
MORA routing and capacity building in disruption-tolerant networks. Ad Hoc Networks 6(4): 600-620 (2008) - [j10]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
Passive-Logging Attacks Against Anonymous Communications Systems. ACM Trans. Inf. Syst. Secur. 11(2): 3:1-3:34 (2008) - [c45]N. Boris Margolin, Brian Neil Levine:
Quantifying Resistance to the Sybil Attack. Financial Cryptography 2008: 1-15 - [c44]Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani:
Enhancing interactive web applications in hybrid networks. MobiCom 2008: 70-80 - [c43]Nilanjan Banerjee, Mark D. Corner, Donald F. Towsley, Brian Neil Levine:
Relays, base stations, and meshes: enhancing mobile networks with infrastructure. MobiCom 2008: 81-91 - [c42]Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, Brian Neil Levine, John Zahorjan:
Interactive wifi connectivity for moving vehicles. SIGCOMM 2008: 427-438 - 2007
- [j9]Nathaniel E. Baughman, Marc Liberatore, Brian Neil Levine:
Cheat-proof playout for centralized and peer-to-peer gaming. IEEE/ACM Trans. Netw. 15(1): 1-13 (2007) - [c41]Gerome Miklau, Brian Neil Levine, Patrick Stahlberg:
Securing history: Privacy and accountability in database systems. CIDR 2007: 387-396 - [c40]N. Boris Margolin, Brian Neil Levine:
Informant: Detecting Sybils Using Incentives. Financial Cryptography 2007: 192-207 - [c39]Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine:
An Energy-Efficient Architecture for DTN Throwboxes. INFOCOM 2007: 776-784 - [c38]Aruna Balasubramanian, Yun Zhou, W. Bruce Croft, Brian Neil Levine, Arun Venkataramani:
Web search from a bus. Challenged Networks 2007: 59-66 - [c37]Xiaolan Zhang, Jim Kurose, Brian Neil Levine, Donald F. Towsley, Honggang Zhang:
Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing. MobiCom 2007: 195-206 - [c36]John Burgess, George Dean Bissias, Mark D. Corner, Brian Neil Levine:
Surviving attacks on disruption-tolerant networks without authentication. MobiHoc 2007: 61-70 - [c35]Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani:
DTN routing as a resource allocation problem. SIGCOMM 2007: 373-384 - [c34]George Dean Bissias, Brian Neil Levine, Arnold L. Rosenberg:
Bounding damage from link destruction, with application to the internet. SIGMETRICS 2007: 367-368 - [c33]Patrick Stahlberg, Gerome Miklau, Brian Neil Levine:
Threats to privacy in the forensic analysis of database systems. SIGMOD Conference 2007: 91-102 - 2006
- [j8]Brian Neil Levine, Clay Shields:
Internet security. Comput. Commun. 29(3): 279 (2006) - [c32]Marc Liberatore, Brian Neil Levine:
Inferring the source of encrypted HTTP connections. CCS 2006: 255-263 - [c31]Marc Liberatore, Brian Neil Levine, Chadi Barakat:
Maximizing transfer opportunities in bluetooth DTNs. CoNEXT 2006: 3 - [c30]Brendan Burns, Oliver Brock, Brian Neil Levine:
Autonomous Enhancement of Disruption Tolerant Networks. ICRA 2006: 2105-2110 - [c29]John Burgess, Brian Gallagher, David D. Jensen, Brian Neil Levine:
MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks. INFOCOM 2006 - [c28]Wenrui Zhao, Yang Chen, Mostafa H. Ammar, Mark D. Corner, Brian Neil Levine, Ellen W. Zegura:
Capacity Enhancement using Throwboxes in DTNs. MASS 2006: 31-40 - [c27]Jim Partan, Jim Kurose, Brian Neil Levine:
A survey of practical issues in underwater networks. Underwater Networks 2006: 17-24 - [c26]Chris Piro, Clay Shields, Brian Neil Levine:
Detecting the Sybil Attack in Mobile Ad hoc Networks. SecureComm 2006: 1-11 - [e1]Brian Neil Levine, Mark Claypool:
Network and Operating System Support for Digital Audio and Video, 16th International Workshop, NOSSDAV 2006, Newport, Rhode Island, USA, November 22-23, 2006, Proceedings. ACM 2006, ISBN 1-59593-285-2 [contents] - 2005
- [j7]Kimaya Sanzgiri, D. LaFlamme, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer:
Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Commun. 23(3): 598-610 (2005) - [c25]Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg:
On the cost-ineffectiveness of redundancy in commercial P2P computing. CCS 2005: 280-288 - [c24]Brendan Burns, Oliver Brock, Brian Neil Levine:
MV routing and capacity building in disruption tolerant networks. INFOCOM 2005: 398-408 - [c23]Andrew S. Fast, David D. Jensen, Brian Neil Levine:
Creating social networks to improve peer-to-peer networking. KDD 2005: 568-573 - [c22]Aaron St. John, Brian Neil Levine:
Supporting P2P gaming when players have heterogeneous resources. NOSSDAV 2005: 1-6 - [c21]George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine:
Privacy Vulnerabilities in Encrypted HTTP Streams. Privacy Enhancing Technologies 2005: 1-11 - 2004
- [j6]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7(4): 489-522 (2004) - [c20]Haizheng Zhang, W. Bruce Croft, Brian Neil Levine, Victor R. Lesser:
A Multi-Agent Approach for Peer-to-Peer Based Information Retrieval System. AAMAS 2004: 456-463 - [c19]N. Boris Margolin, Matthew K. Wright, Brian Neil Levine:
Analysis of an incentives-based secrets protection system. Digital Rights Management Workshop 2004: 22-30 - [c18]Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew K. Wright:
Timing Attacks in Low-Latency Mix Systems (Extended Abstract). Financial Cryptography 2004: 251-265 - [c17]Jacky Chu, Kevin Labonte, Brian Neil Levine:
An evaluation of chord using traces of peer-to-peer file sharing. SIGMETRICS 2004: 432-433 - 2003
- [j5]Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-Aceves:
Organizing multicast receivers deterministically by packet-loss correlation. Multim. Syst. 9(1): 3-14 (2003) - [c16]Katrina M. Hanna, Brian Neil Levine, R. Manmatha:
Mobile Distributed Information Retrieval for Highly-Partitioned Networks. ICNP 2003: 38- - [c15]Daniel S. Bernstein, Zhengzhu Feng, Brian Neil Levine, Shlomo Zilberstein:
Adaptive Peer Selection. IPTPS 2003: 237-246 - [c14]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
Defending Anonymous Communications Against Passive Logging Attack. S&P 2003: 28-41 - 2002
- [j4]Brian Neil Levine, Clay Shields:
Hordes: a Multicast-Based Protocol for Anonymity. J. Comput. Secur. 10(3): 213-240 (2002) - [j3]Don Towsley, Christophe Diot, Brian Neil Levine, Luigi Rizzo:
Guest editorial - network support for multicast communications. IEEE J. Sel. Areas Commun. 20(8): 1441-1443 (2002) - [c13]Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer:
A Secure Routing Protocol for Ad Hoc Networks. ICNP 2002: 78-89 - [c12]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
An Analysis of the Degradation of Anonymous Protocols. NDSS 2002: 1-12 - 2001
- [c11]V. Scarlata, Brian Neil Levine, Clay Shields:
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. ICNP 2001: 272-280 - [c10]Katrina M. Hanna, Nandini Natarajan, Brian Neil Levine:
Evaluation of a Novel Two-Step Server Selection Metric. ICNP 2001: 290-300 - [c9]Nathaniel E. Baughman, Brian Neil Levine:
Cheat-proof Playout for Centralized and Distributed Online Games. INFOCOM 2001: 104-113 - [c8]James A. Davis, Andrew H. Fagg, Brian Neil Levine:
Wearable Computers as Packet Transport Mechanisms in Highly-Partitioned Ad-Hoc Networks. ISWC 2001: 141-148 - 2000
- [j2]Christophe Diot, Brian Neil Levine, J. Bryan Lyles, H. Kassem, D. Balensiefen:
Deployment issues for the IP multicast service and architecture. IEEE Netw. 14(1): 78-88 (2000) - [c7]Clay Shields, Brian Neil Levine:
A protocol for anonymous communication over the Internet. CCS 2000: 33-42 - [c6]Brian Neil Levine, Jon Crowcroft, Christophe Diot, J. J. Garcia-Luna-Aceves, James F. Kurose:
Consideration of Receiver Interest for IP Multicast Delivery. INFOCOM 2000: 470-479 - [c5]Joerg Walz, Brian Neil Levine:
A hierarchical multicast monitoring scheme. Networked Group Communication 2000: 105-116
1990 – 1999
- 1998
- [j1]Brian Neil Levine, J. J. Garcia-Luna-Aceves:
A Comparison of Reliable Multicast Protocols. Multim. Syst. 6(5): 334-348 (1998) - [c4]Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-Aceves:
Organizing Multicast Receivers Deterministically by Packet-Loss Correlation. ACM Multimedia 1998: 201-210 - 1997
- [c3]Brian Neil Levine, J. J. Garcia-Luna-Aceves:
Improving Internet multicast with routing labels. ICNP 1997: 241-250 - 1996
- [c2]Brian Neil Levine, J. J. Garcia-Luna-Aceves:
A Comparison of Known Classes of Reliable Multicast Protocols. ICNP 1996: 112- - [c1]Brian Neil Levine, David B. Lavo, J. J. Garcia-Luna-Aceves:
The Case for Reliable Concurrent Multicasting Using Shared Ack Trees. ACM Multimedia 1996: 365-376
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.