Nicholas Hopper
Nicholas Hopper
Professor of Computer Science & Engineering, University of Minnesota
Verified email at - Homepage
Cited by
Cited by
CAPTCHA: Using hard AI problems for security
LV Ahn, M Blum, NJ Hopper, J Langford
Proceedings of the 22nd international conference on Theory and applications …, 2003
Secure human identification protocols
NJ Hopper, M Blum
Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
How much anonymity does network latency leak?
N Hopper, EY Vasserman, E Chan-Tin
ACM Transactions on Information and System Security (TISSEC) 13 (2), 13, 2010
Provably secure steganography
N Hopper, L von Ahn, J Langford
IEEE Transactions on Computers, 662-676, 2008
Vampire attacks: draining life from wireless ad hoc sensor networks
EY Vasserman, N Hopper
IEEE transactions on mobile computing 12 (2), 318-332, 2011
Shadow: Running Tor in a box for accurate and efficient experimentation
R Jansen, NJ Hopper
Public-key steganography
L Von Ahn, NJ Hopper
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
Analysis of genetic diversity through population history
NF McPhee, NJ Hopper
Proceedings of the genetic and evolutionary computation conference 2, 1112-1120, 1999
Keep your friends close: Incorporating trust into social network-based sybil defenses
A Mohaisen, N Hopper, Y Kim
2011 Proceedings IEEE INFOCOM, 1943-1951, 2011
Losing control of the internet: using the data plane to attack the control plane
M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Scalable onion routing with torsk
J McLachlan, A Tran, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Location leaks on the GSM air interface
DF Kune, J Koelndorfer, N Hopper, Y Kim
ISOC NDSS (Feb 2012), 2012
Recruiting new Tor relays with BRAIDS
R Jansen, N Hopper, Y Kim
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Routing around decoys
M Schuchard, J Geddes, C Thompson, N Hopper
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
A secure human-computer authentication scheme
NJ Hopper, M Blum
Carnegie-Mellon Univ Pittsburgh Pa School Of Computer Science, 2000
The frog-boiling attack: Limitations of secure network coordinate systems
E Chan-Tin, V Heorhiadi, N Hopper, Y Kim
ACM Transactions on information and system security (TISSEC) 14 (3), 1-23, 2011
Attacking the kad network
P Wang, J Tyra, E Chan-Tin, T Malchow, DF Kune, N Hopper, Y Kim
Proceedings of the 4th international conference on Security and privacy in …, 2008
K-anonymous message transmission
L Von Ahn, A Bortz, NJ Hopper
Proceedings of the 10th ACM conference on Computer and Communications …, 2003
The CAPTCHA project,“Completely automatic public turing test to tell computers and humans apart,”
M Blum, LA Von Ahn, J Langford, N Hopper
School of Computer Science, Carnegie-Mellon University, http://www. captcha. net, 2000
The system can't perform the operation now. Try again later.
Articles 1–20