Остановите войну!
for scientists:
default search action
Eric Wustrow
- > Home > Persons > Eric Wustrow
Publications
- 2023
- [i4]Erik Chi, Gaukas Wang, J. Alex Halderman, Eric Wustrow, Jack Wampler:
Just add WATER: WebAssembly-based Circumvention Transports. CoRR abs/2312.00163 (2023) - 2020
- [j2]Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, Eric Wustrow:
Running Refraction Networking for Real. Proc. Priv. Enhancing Technol. 2020(4): 321-335 (2020) - [c29]Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi:
Investigating Large Scale HTTPS Interception in Kazakhstan. Internet Measurement Conference 2020: 125-132 - 2019
- [j1]David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann:
Imperfect forward secrecy: how Diffie-Hellman fails in practice. Commun. ACM 62(1): 106-114 (2019) - [c26]Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow:
Conjure: Summoning Proxies from Unused Address Space. CCS 2019: 2215-2229 - 2018
- [c19]Sergey Frolov, Eric Wustrow, Frederick Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman:
An ISP-Scale Deployment of TapDance. ANRW 2018: 22 - 2017
- [c16]Eduardo E. P. Pujol, Will Scott, Eric Wustrow, J. Alex Halderman:
Initial measurements of the cuban street network. Internet Measurement Conference 2017: 318-324 - [c15]Sergey Frolov, Frederick Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, Eric Wustrow:
An ISP-Scale Deployment of TapDance. FOCI @ USENIX Security Symposium 2017 - 2015
- [c12]David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann:
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. CCS 2015: 5-17 - [c11]Ben Burgess, Eric Wustrow, J. Alex Halderman:
Replication Prohibited: Attacking Restricted Keyways with 3D-Printing. WOOT 2015 - 2014
- [c10]Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow:
Elliptic Curve Cryptography in Practice. Financial Cryptography 2014: 157-175 - [c9]Eric Wustrow, Colleen Swanson, J. Alex Halderman:
TapDance: End-to-Middle Anticensorship without Flow Blocking. USENIX Security Symposium 2014: 159-174 - [c8]Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, J. Alex Halderman, Hovav Shacham, Stephen Checkoway:
Security Analysis of a Full-Body Scanner. USENIX Security Symposium 2014: 369-384 - 2013
- [c7]James Kasten, Eric Wustrow, J. Alex Halderman:
CAge: Taming Certificate Authorities by Inferring Restricted Scopes. Financial Cryptography 2013: 329-337 - [c6]Zakir Durumeric, Eric Wustrow, J. Alex Halderman:
ZMap: Fast Internet-wide Scanning and Its Security Applications. USENIX Security Symposium 2013: 605-620 - [i1]Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow:
Elliptic Curve Cryptography in Practice. IACR Cryptol. ePrint Arch. 2013: 734 (2013) - 2012
- [c5]Scott Wolchok, Eric Wustrow, Dawn Isabel, J. Alex Halderman:
Attacking the Washington, D.C. Internet Voting System. Financial Cryptography 2012: 114-128 - [c4]Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman:
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. USENIX Security Symposium 2012: 205-220 - 2011
- [c3]Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman:
Telex: Anticensorship in the Network Infrastructure. USENIX Security Symposium 2011 - 2010
- [c2]Scott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, Rop Gonggrijp:
Security analysis of India's electronic voting machines. CCS 2010: 1-14
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint