Nicholas Hopper
Nicholas Hopper
Professor of Computer Science & Engineering, University of Minnesota
Verified email at umn.edu - Homepage
Title
Cited by
Cited by
Year
CAPTCHA: Using hard AI problems for security
LV Ahn, M Blum, NJ Hopper, J Langford
Proceedings of the 22nd international conference on Theory and applications …, 2003
18762003
Secure human identification protocols
NJ Hopper, M Blum
International conference on the theory and application of cryptology and …, 2001
6282001
How much anonymity does network latency leak?
N Hopper, EY Vasserman, E Chan-Tin
ACM Transactions on Information and System Security (TISSEC) 13 (2), 13, 2010
2682010
Provably secure steganography
N Hopper, L von Ahn, J Langford
IEEE Transactions on Computers, 662-676, 2008
261*2008
Vampire attacks: Draining life from wireless ad hoc sensor networks
EY Vasserman, N Hopper
IEEE transactions on mobile computing 12 (2), 318-332, 2011
1922011
Service combinators for web computing
L Cardelli, R Davies
IEEE Transactions on Software Engineering 25 (3), 309-316, 1999
1671999
Public-key steganography
L Von Ahn, NJ Hopper
International Conference on the Theory and Applications of Cryptographic …, 2004
1612004
Analysis of genetic diversity through population history
NF McPhee, NJ Hopper
Proceedings of the genetic and evolutionary computation conference 2, 1112-1120, 1999
1491999
Shadow: Running Tor in a box for accurate and efficient experimentation
R Jansen, N Hooper
MINNESOTA UNIV MINNEAPOLIS DEPT OF COMPUTER SCIENCE AND ENGINEERING, 2011
1482011
Keep your friends close: Incorporating trust into social network-based sybil defenses
A Mohaisen, N Hopper, Y Kim
2011 Proceedings IEEE INFOCOM, 1943-1951, 2011
1302011
Scalable onion routing with torsk
J McLachlan, A Tran, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1212009
Losing control of the internet: using the data plane to attack the control plane
M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1142010
Recruiting new Tor relays with BRAIDS
R Jansen, N Hopper, Y Kim
Proceedings of the 17th ACM conference on Computer and communications …, 2010
942010
A secure human-computer authentication scheme
NJ Hopper, M Blum
CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 2000
892000
Attacking the kad network
P Wang, J Tyra, E Chan-Tin, T Malchow, DF Kune, N Hopper, Y Kim
Proceedings of the 4th international conference on Security and privacy in …, 2008
88*2008
Routing around decoys
M Schuchard, J Geddes, C Thompson, N Hopper
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
862012
Location leaks on the GSM air interface
DF Kune, J Koelndorfer, N Hopper, Y Kim
ISOC NDSS (Feb 2012), 2012
852012
Membership-concealing overlay networks
E Vasserman, R Jansen, J Tyra, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications …, 2009
802009
The captcha project (completely automatic public turing test to tell computers and humans apart)
M Blum, LA Von Ahn, J Langford, N Hopper
School of Computer Science, Carnegie-Mellon University, http://www. captcha. net, 2000
802000
Cover your acks: Pitfalls of covert channel censorship circumvention
J Geddes, M Schuchard, N Hopper
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
772013
The system can't perform the operation now. Try again later.
Articles 1–20