Cecylia Bocovich
Cecylia Bocovich
The Tor Project
Verified email at
Cited by
Cited by
Leading Johnny to water: Designing for usability and trust
E Atwater, C Bocovich, U Hengartner, E Lank, I Goldberg
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), USENIX …, 2015
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
C Bocovich, I Goldberg
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Variable-specific resolutions for feature interactions
C Bocovich, JM Atlee
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
Secure asymmetry and deployability for decoy routing systems
C Bocovich, I Goldberg
Proceedings on Privacy Enhancing Technologies, 2018
Exploring simple detection techniques for DNS-over-HTTPS tunnels
C Kwan, P Janiszewski, S Qiu, C Wang, C Bocovich
Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications …, 2021
Lavinia: An audit-payment protocol for censorship-resistant storage
C Bocovich, JA Doucette, I Goldberg
Financial Cryptography and Data Security: 21st International Conference, FC …, 2017
Live Lesson: Netsim: Network simulation and hacking for high schoolers
E Atwater, C Bocovich, U Hengartner, I Goldberg
2017 {USENIX} Workshop on Advances in Security Education ({ASE} 17), 2017
OUStralopithecus: Overt user simulation for censorship circumvention
AH Lorimer, L Tulloch, C Bocovich, I Goldberg
Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic …, 2021
Feature-Oriented Modelling in BIP: A Case Study
C Bocovich, J Atlee
3nd International Workshop on Interplay of Model-Driven and Component-Based …, 2016
A feature interaction resolution scheme based on controlled phenomena
C Bocovich
University of Waterloo, 2014
Elliptic Curves of High Rank
C Bocovich
Addressing denial of service attacks on free and open communication on the internet
C Bocovich, R Dingledine, A Færøy, K Hanna, P Winter, T Yu
Tech. Rep. 2019-05-001, 2019.[Online]. Available: https://research …, 2019
Recipes for Resistance: A Censorship Circumvention Cookbook
C Bocovich
University of Waterloo, 2018
Poster: Incentivized Censorship Resistance with Payment Contracts
C Bocovich, JA Doucette, I Goldberg
The system can't perform the operation now. Try again later.
Articles 1–14