default search action
Aaron Johnson 0001
Person information
- affiliation: U.S. Naval Research Laboratory, Washington, D.C., USA
Other persons with the same name
- Aaron Johnson — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Rob Jansen, Ryan Wails, Aaron Johnson:
Repositioning Real-World Website Fingerprinting on Tor. WPES@CCS 2024: 124-140 - [i12]Rob Jansen, Ryan Wails, Aaron Johnson:
A Measurement of Genuine Tor Traces for Realistic Website Fingerprinting. CoRR abs/2404.07892 (2024) - [i11]Ellis Fenske, Aaron Johnson:
Bytes to Schlep? Use a FEP: Hiding Protocol Metadata with Fully Encrypted Protocols. CoRR abs/2405.13310 (2024) - 2023
- [j13]Aaron Johnson, Aaron D. Jaggard, Paul Syverson:
Throwing Your Weight Around: Fixing Tor's Positional Weighting. Proc. Priv. Enhancing Technol. 2023(4): 593-612 (2023) - [c25]Sajin Sasy, Aaron Johnson, Ian Goldberg:
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks. CCS 2023: 3328-3342 - [i10]Sajin Sasy, Aaron Johnson, Ian Goldberg:
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks. IACR Cryptol. ePrint Arch. 2023: 1236 (2023) - 2022
- [j12]Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr:
Accountable Private Set Cardinality for Distributed Measurement. ACM Trans. Priv. Secur. 25(4): 25:1-25:35 (2022) - [c24]Sajin Sasy, Aaron Johnson, Ian Goldberg:
Fast Fully Oblivious Compaction and Shuffling. CCS 2022: 2565-2579 - [i9]Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr:
Accountable Private Set Cardinality for Distributed Measurement. CoRR abs/2206.15068 (2022) - [i8]Sajin Sasy, Aaron Johnson, Ian Goldberg:
Fast Fully Oblivious Compaction and Shuffling. IACR Cryptol. ePrint Arch. 2022: 1333 (2022) - 2021
- [j11]Aaron Johnson, Florian Kerschbaum:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2021(1): 1-4 (2021) - [j10]Aaron Johnson, Florian Kerschbaum:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2021(2): 1-4 (2021) - [j9]Aaron Johnson, Florian Kerschbaum:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2021(3): 1-4 (2021) - [j8]Aaron Johnson, Florian Kerschbaum:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2021(4): 1-5 (2021) - [c23]Matthew Traudt, Rob Jansen, Aaron Johnson:
FlashFlow: A Secure Speed Test for Tor. ICDCS 2021: 381-391 - [c22]Rob Jansen, Aaron Johnson:
On the Accuracy of Tor Bandwidth Estimation. PAM 2021: 481-498 - 2020
- [c21]Florentin Rochet, Ryan Wails, Aaron Johnson, Prateek Mittal, Olivier Pereira:
CLAPS: Client-Location-Aware Path Selection in Tor. CCS 2020: 17-34 - [i7]Matthew Traudt, Rob Jansen, Aaron Johnson:
FlashFlow: A Secure Speed Test for Tor. CoRR abs/2004.09583 (2020)
2010 – 2019
- 2019
- [j7]Gerry Wan, Aaron Johnson, Ryan Wails, Sameer Wagh, Prateek Mittal:
Guard Placement Attacks on Path Selection Algorithms for Tor. Proc. Priv. Enhancing Technol. 2019(4): 272-291 (2019) - [c20]Ryan Wails, Aaron Johnson, Daniel Starin, Arkady Yerukhimovich, S. Dov Gordon:
Stormy: Statistics in Tor by Measuring Securely. CCS 2019: 615-632 - 2018
- [j6]Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal:
Tempest: Temporal Dynamics in Anonymity Systems. Proc. Priv. Enhancing Technol. 2018(3): 22-42 (2018) - [c19]Aaron Johnson, Ryan Henry:
17th Workshop on Privacy in the Electronic Society (WPES 2018). CCS 2018: 2181-2182 - [c18]Akshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, Micah Sherr:
Understanding Tor Usage with Privacy-Preserving Measurement. Internet Measurement Conference 2018: 175-187 - [e1]David Lie, Mohammad Mannan, Aaron Johnson:
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, WPES@CCS 2018, Toronto, ON, Canada, October 15-19, 2018. ACM 2018, ISBN 978-1-4503-5989-4 [contents] - [i6]Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal:
Tempest: Temporal Dynamics in Anonymity Systems. CoRR abs/1801.01932 (2018) - [i5]Akshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, Micah Sherr:
Understanding Tor Usage with Privacy-Preserving Measurement. CoRR abs/1809.08481 (2018) - 2017
- [j5]Aaron Johnson, Rob Jansen, Nicholas Hopper, Aaron Segal, Paul Syverson:
PeerFlow: Secure Load Balancing in Tor. Proc. Priv. Enhancing Technol. 2017(2): 74-94 (2017) - [c17]Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr:
Distributed Measurement with Private Set-Union Cardinality. CCS 2017: 2295-2312 - [c16]Aaron Johnson, Rob Jansen, Aaron D. Jaggard, Joan Feigenbaum, Paul Syverson:
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection. NDSS 2017 - 2016
- [c15]Rob Jansen, Aaron Johnson:
Safely Measuring Tor. CCS 2016: 1553-1567 - 2015
- [j4]Aaron D. Jaggard, Aaron Johnson, Sarah Cortes, Paul Syverson, Joan Feigenbaum:
20, 000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables. Proc. Priv. Enhancing Technol. 2015(1): 4-24 (2015) - [j3]Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, Matthew Caesar:
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction. Proc. Priv. Enhancing Technol. 2015(2): 171-187 (2015) - [i4]Aaron Johnson, Rob Jansen, Aaron D. Jaggard, Joan Feigenbaum, Paul F. Syverson:
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection. CoRR abs/1511.05453 (2015) - 2014
- [j2]Ewa Syta, Henry Corrigan-Gibbs, Shu-Chun Weng, David Wolinsky, Bryan Ford, Aaron Johnson:
Security Analysis of Accountable Anonymity in Dissent. ACM Trans. Inf. Syst. Secur. 17(1): 4:1-4:35 (2014) - [c14]Rob Jansen, Florian Tschorsch, Aaron Johnson, Björn Scheuermann:
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. NDSS 2014 - [i3]Aaron D. Jaggard, Aaron Johnson, Paul F. Syverson, Joan Feigenbaum:
Representing Network Trust and Using It to Improve Anonymous Communication. CoRR abs/1406.3583 (2014) - [i2]Joshua Juen, Anupam Das, Aaron Johnson, Nikita Borisov, Matthew Caesar:
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction. CoRR abs/1410.1823 (2014) - 2013
- [c13]Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, Paul F. Syverson:
Users get routed: traffic correlation on tor by realistic adversaries. CCS 2013: 337-348 - [c12]Aaron Johnson, Rob Jansen, Paul F. Syverson:
Onions for Sale: Putting Privacy on the Market. Financial Cryptography 2013: 399-400 - [c11]Aaron Johnson, Vitaly Shmatikov:
Privacy-preserving data exploration in genome-wide association studies. KDD 2013: 1079-1087 - [c10]Rob Jansen, Aaron Johnson, Paul F. Syverson:
LIRA: Lightweight Incentivized Routing for Anonymity. NDSS 2013 - 2012
- [j1]Joan Feigenbaum, Aaron Johnson, Paul F. Syverson:
Probabilistic analysis of onion routing in a black-box model. ACM Trans. Inf. Syst. Secur. 15(3): 14:1-14:28 (2012) - [c9]David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, Aaron Johnson:
Dissent in Numbers: Making Strong Anonymity Scale. OSDI 2012: 179-182 - 2011
- [c8]Aaron Johnson, Paul F. Syverson, Roger Dingledine, Nick Mathewson:
Trust-based anonymous communication: adversary models and routing algorithms. CCS 2011: 175-186 - [i1]Joan Feigenbaum, Aaron Johnson, Paul F. Syverson:
Probabilistic Analysis of Onion Routing in a Black-box Model. CoRR abs/1111.2520 (2011) - 2010
- [c7]Joan Feigenbaum, Aaron Johnson, Paul F. Syverson:
Preventing Active Timing Attacks in Low-Latency Anonymous Communication. Privacy Enhancing Technologies 2010: 166-183
2000 – 2009
- 2009
- [c6]Aaron Johnson, Paul F. Syverson:
More Anonymous Onion Routing Through Trust. CSF 2009: 3-12 - 2007
- [c5]Joan Feigenbaum, Aaron Johnson, Paul F. Syverson:
A Model of Onion Routing with Provable Anonymity. Financial Cryptography 2007: 57-71 - [c4]Joan Feigenbaum, Aaron Johnson, Paul F. Syverson:
Probabilistic analysis of onion routing in a black-box model. WPES 2007: 1-10 - [c3]Felipe Saint-Jean, Aaron Johnson, Dan Boneh, Joan Feigenbaum:
Private web search. WPES 2007: 84-90 - 2004
- [c2]John Dunagan, Roussi Roussev, Brad Daniels, Aaron Johnson, Chad Verbowski, Yi-Min Wang:
Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests. ICAC 2004: 106-113 - [c1]Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo:
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. LISA 2004: 33-46
Coauthor Index
aka: Paul Syverson
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint