Nicholas Hopper
Nicholas Hopper
Professor of Computer Science & Engineering, University of Minnesota
Verified email at umn.edu - Homepage
Title
Cited by
Cited by
Year
CAPTCHA: Using hard AI problems for security
LV Ahn, M Blum, NJ Hopper, J Langford
Proceedings of the 22nd international conference on Theory and applications†…, 2003
20182003
Secure human identification protocols
NJ Hopper, M Blum
International conference on the theory and application of cryptology and†…, 2001
6802001
How much anonymity does network latency leak?
N Hopper, EY Vasserman, E Chan-Tin
ACM Transactions on Information and System Security (TISSEC) 13 (2), 13, 2010
2912010
Provably secure steganography
N Hopper, L von Ahn, J Langford
IEEE Transactions on Computers, 662-676, 2008
273*2008
Vampire attacks: Draining life from wireless ad hoc sensor networks
EY Vasserman, N Hopper
IEEE transactions on mobile computing 12 (2), 318-332, 2011
2182011
Public-key steganography
L Von Ahn, NJ Hopper
International Conference on the Theory and Applications of Cryptographic†…, 2004
1722004
Shadow: Running Tor in a box for accurate and efficient experimentation
R Jansen, NJ Hopper
1702011
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
D ‹nay, Z «ataltepe, S Aksoy
Lecture Notes in Computer Science (including subseries Lecture Notes in†…, 2010
170*2010
Analysis of genetic diversity through population history
NF McPhee, NJ Hopper
Proceedings of the genetic and evolutionary computation conference 2, 1112-1120, 1999
1591999
Keep your friends close: Incorporating trust into social network-based sybil defenses
A Mohaisen, N Hopper, Y Kim
2011 Proceedings IEEE INFOCOM, 1943-1951, 2011
1422011
Scalable onion routing with torsk
J McLachlan, A Tran, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications†…, 2009
1262009
Losing control of the internet: using the data plane to attack the control plane
M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman
Proceedings of the 17th ACM conference on Computer and communications†…, 2010
1252010
Location leaks on the GSM air interface
DF Kune, J Koelndorfer, N Hopper, Y Kim
ISOC NDSS (Feb 2012), 2012
1052012
Recruiting new Tor relays with BRAIDS
R Jansen, N Hopper, Y Kim
Proceedings of the 17th ACM conference on Computer and communications†…, 2010
1042010
Routing around decoys
M Schuchard, J Geddes, C Thompson, N Hopper
Proceedings of the 2012 ACM conference on Computer and communications†…, 2012
972012
Attacking the kad network
P Wang, J Tyra, E Chan-Tin, T Malchow, DF Kune, N Hopper, Y Kim
Proceedings of the 4th international conference on Security and privacy in†…, 2008
91*2008
A secure human-computer authentication scheme
NJ Hopper, M Blum
Carnegie-Mellon Univ Pittsburgh Pa School Of Computer Science, 2000
912000
The captcha project (completely automatic public turing test to tell computers and humans apart)
M Blum, LA Von Ahn, J Langford, N Hopper
School of Computer Science, Carnegie-Mellon University, http://www. captcha. net, 2000
892000
The frog-boiling attack: Limitations of secure network coordinate systems
E Chan-Tin, V Heorhiadi, N Hopper, Y Kim
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-23, 2011
87*2011
Membership-concealing overlay networks
E Vasserman, R Jansen, J Tyra, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications†…, 2009
842009
The system can't perform the operation now. Try again later.
Articles 1–20