Aaron Johnson
Title
Cited by
Cited by
Year
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
A Johnson, C Wacek, R Jansen, M Sherr, P Syverson
2302013
Dissent in numbers: making strong anonymity scale
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
Proceedings of the 10th USENIX conference on Operating Systems Design and …, 2012
1652012
Privacy-preserving data exploration in genome-wide association studies
A Johnson, V Shmatikov
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
1482013
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network
R Jansen, F Tschorsch, A Johnson, B Scheuermann
Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, USA, 2014
1042014
Probabilistic analysis of onion routing in a black-box model
J Feigenbaum, A Johnson, P Syverson
ACM Transactions on Information and System Security (TISSEC) 15 (3), 1-28, 2012
892012
Probabilistic analysis of onion routing in a black-box model
J Feigenbaum, A Johnson, P Syverson
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 1-10, 2007
89*2007
A model of onion routing with provable anonymity
J Feigenbaum, A Johnson, P Syverson
International Conference on Financial Cryptography and Data Security, 57-71, 2007
802007
Private web search
F Saint-Jean, A Johnson, D Boneh, J Feigenbaum
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 84-90, 2007
762007
Trust-based anonymous communication: adversary models and routing algorithms
AM Johnson, P Syverson, R Dingledine, N Mathewson
Proceedings of the 18th ACM conference on Computer and communications …, 2011
552011
Safely Measuring Tor
R Jansen, A Johnson
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
522016
LIRA: Lightweight Incentivized Routing for Anonymity
R Jansen, A Johnson, P Syverson
the 20th Network and Distributed System Security Symposium.(February 2013), 2013
422013
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction.
J Juen, A Johnson, A Das, N Borisov, M Caesar
PoPETs 2015 (2), 171-187, 2015
352015
Preventing active timing attacks in low-latency anonymous communication
J Feigenbaum, A Johnson, P Syverson
Privacy Enhancing Technologies, 166-183, 2010
34*2010
More anonymous onion routing through trust
A Johnson, P Syverson
Computer Security Foundations Symposium, 2009. CSF'09. 22nd IEEE, 3-12, 2009
342009
Scalable anonymous group communication in the anytrust model
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
European Workshop on System Security (EuroSec) 4, 2012
332012
Security analysis of accountable anonymous group communication in Dissent
E Syta, A Johnson, H Corrigan-Gibbs, SC Weng, D Wolinsky, B Ford
YALE UNIV NEW HAVEN CT DEPT OF COMPUTER SCIENCE, 2013
24*2013
Security analysis of accountable anonymity in Dissent
E Syta, H Corrigan-Gibbs, SC Weng, D Wolinsky, B Ford, A Johnson
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-35, 2014
212014
PeerFlow: Secure Load Balancing in Tor
A Johnson, R Jansen, N Hopper, A Segal, P Syverson
Proceedings on Privacy Enhancing Technologies 2017 (2), 74-94, 2017
202017
Understanding tor usage with privacy-preserving measurement
A Mani, T Wilson-Brown, R Jansen, A Johnson, M Sherr
Proceedings of the Internet Measurement Conference 2018, 175-187, 2018
172018
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection
A Johnson, R Jansen, AD Jaggard, J Feigenbaum, P Syverson
24th Network and Distributed System Security Symposium (NDSS 2017), 2017
172017
The system can't perform the operation now. Try again later.
Articles 1–20