Nikita Borisov
Nikita Borisov
Professor of Electrical and Computer Engineering, University of Illinois at Urbana
Verified email at - Homepage
Cited by
Cited by
Intercepting mobile communications: The insecurity of 802.11
N Borisov, I Goldberg, D Wagner
Proceedings of the 7th annual international conference on Mobile computing …, 2001
EASiER: Encryption-based access control in social networks with efficient revocation
S Jahid, P Mittal, N Borisov
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
The tangled web of password reuse.
A Das, J Bonneau, M Caesar, N Borisov, XF Wang
NDSS 14 (2014), 23-26, 2014
Off-the-record communication, or, why not to use PGP
N Borisov, I Goldberg, E Brewer
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 77-84, 2004
Flybynight: mitigating the privacy risks of social networking
MM Lucas, N Borisov
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 1-8, 2008
BotGrep: Finding P2P bots with structured graph analysis
S Nagaraja, P Mittal, CY Hong, M Caesar, N Borisov
Proceedings of the 19th USENIX conference on Security, 7-7, 2010
Denial of service or denial of security?
N Borisov, G Danezis, P Mittal, P Tabriz
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Computational puzzles as sybil defenses
N Borisov
Peer-to-Peer Computing, 2006. P2P 2006. Sixth IEEE International Conference …, 2006
A tune-up for Tor: Improving security and performance in the Tor network
R Snader, N Borisov
Proceedings of the Network and Distributed Security Symposium-NDSS 8, 2008
Rainbow: A robust and invisible non-blind watermark for network flows
A Houmansadr, N Kiyavash, N Borisov
Proceedings of the Network and Distributed System Security Symposium (NDSS …, 2009
A generic application-level protocol analyzer and its language
N Borisov, DJ Brumley, HJ Wang, J Dunagan, P Joshi, C Guo
14h Symposium on Network and Distributed System Security (NDSS), 2007
DECENT: A decentralized architecture for enforcing privacy in online social networks
S Jahid, S Nilizadeh, P Mittal, N Borisov, A Kapadia
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
Cirripede: circumvention infrastructure using router redirection with plausible deniability
A Houmansadr, GTK Nguyen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Cachet: a decentralized architecture for privacy preserving social networking with caching
S Nilizadeh, S Jahid, P Mittal, N Borisov, A Kapadia
Proceedings of the 8th international conference on Emerging networking …, 2012
Do you hear what i hear? fingerprinting smart devices through embedded acoustic components
A Das, N Borisov, M Caesar
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones
S Zonouz, A Houmansadr, R Berthier, N Borisov, W Sanders
Computers & Security 37, 215-227, 2013
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
P Mittal, A Khurshid, J Juen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Enabling privacy-preserving incentives for mobile crowd sensing systems
H Jin, L Su, B Ding, K Nahrstedt, N Borisov
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
Stegobot: a covert social network botnet
S Nagaraja, A Houmansadr, P Piyawongwisal, V Singh, P Agarwal, ...
Information Hiding, 299-313, 2011
The system can't perform the operation now. Try again later.
Articles 1–20