Nicholas Hopper
Nicholas Hopper
Professor of Computer Science & Engineering, University of Minnesota
Verified email at umn.edu - Homepage
Title
Cited by
Cited by
Year
CAPTCHA: Using hard AI problems for security
LV Ahn, M Blum, NJ Hopper, J Langford
Proceedings of the 22nd international conference on Theory and applications†…, 2003
19862003
Secure human identification protocols
NJ Hopper, M Blum
International conference on the theory and application of cryptology and†…, 2001
6752001
How much anonymity does network latency leak?
N Hopper, EY Vasserman, E Chan-Tin
ACM Transactions on Information and System Security (TISSEC) 13 (2), 13, 2010
2872010
Provably secure steganography
N Hopper, L von Ahn, J Langford
IEEE Transactions on Computers, 662-676, 2008
268*2008
Vampire attacks: Draining life from wireless ad hoc sensor networks
EY Vasserman, N Hopper
IEEE transactions on mobile computing 12 (2), 318-332, 2011
2152011
Public-key steganography
L Von Ahn, NJ Hopper
International Conference on the Theory and Applications of Cryptographic†…, 2004
1672004
Shadow: Running Tor in a box for accurate and efficient experimentation
R Jansen, NJ Hopper
1652011
Analysis of genetic diversity through population history
NF McPhee, NJ Hopper
Proceedings of the genetic and evolutionary computation conference 2, 1112-1120, 1999
1591999
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
D ‹nay, Z «ataltepe, S Aksoy
Lecture Notes in Computer Science (including subseries Lecture Notes in†…, 2010
155*2010
Keep your friends close: Incorporating trust into social network-based sybil defenses
A Mohaisen, N Hopper, Y Kim
2011 Proceedings IEEE INFOCOM, 1943-1951, 2011
1402011
Losing control of the internet: using the data plane to attack the control plane
M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman
Proceedings of the 17th ACM conference on Computer and communications†…, 2010
1222010
Scalable onion routing with torsk
J McLachlan, A Tran, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications†…, 2009
1222009
Location leaks on the GSM air interface
DF Kune, J Koelndorfer, N Hopper, Y Kim
ISOC NDSS (Feb 2012), 2012
1042012
Recruiting new Tor relays with BRAIDS
R Jansen, N Hopper, Y Kim
Proceedings of the 17th ACM conference on Computer and communications†…, 2010
1012010
Routing around decoys
M Schuchard, J Geddes, C Thompson, N Hopper
Proceedings of the 2012 ACM conference on Computer and communications†…, 2012
952012
A secure human-computer authentication scheme
NJ Hopper, M Blum
Carnegie-Mellon Univ Pittsburgh Pa School Of Computer Science, 2000
912000
Attacking the kad network
P Wang, J Tyra, E Chan-Tin, T Malchow, DF Kune, N Hopper, Y Kim
Proceedings of the 4th international conference on Security and privacy in†…, 2008
90*2008
The captcha project (completely automatic public turing test to tell computers and humans apart)
M Blum, LA Von Ahn, J Langford, N Hopper
School of Computer Science, Carnegie-Mellon University, http://www. captcha. net, 2000
882000
The frog-boiling attack: Limitations of secure network coordinate systems
E Chan-Tin, V Heorhiadi, N Hopper, Y Kim
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-23, 2011
85*2011
Membership-concealing overlay networks
E Vasserman, R Jansen, J Tyra, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications†…, 2009
822009
The system can't perform the operation now. Try again later.
Articles 1–20