Nikita Borisov
#34,710
Most Influential Person Now
Cryptographer
Nikita Borisov's AcademicInfluence.com Rankings
Nikita Borisovcomputer-science Degrees
Computer Science
#1435
World Rank
#1484
Historical Rank
Database
#8105
World Rank
#8450
Historical Rank
Download Badge
Computer Science
Nikita Borisov's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Nikita Borisov Influential?
(Suggest an Edit or Addition)According to Wikipedia, Nikita Borisov is a cryptographer and computer security researcher, currently an associate professor at the University of Illinois at Urbana-Champaign . His notable work includes one of the first cryptanalyses of the WEP wireless encryption protocol together with Ian Goldberg and David Wagner, and the design of the Off-the-Record Messaging protocol with Goldberg.
Nikita Borisov's Published Works
Published Works
- Intercepting mobile communications: the insecurity of 802.11 (2001) (1099)
- The Tangled Web of Password Reuse (2014) (414)
- The Ninja architecture for robust Internet-scale systems and services (2001) (387)
- EASiER: encryption-based access control in social networks with efficient revocation (2011) (363)
- Off-the-record communication, or, why not to use PGP (2004) (314)
- Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations (2018) (291)
- BotGrep: Finding P2P Bots with Structured Graph Analysis (2010) (275)
- Computational Puzzles as Sybil Defenses (2006) (195)
- flyByNight: mitigating the privacy risks of social networking (2009) (167)
- A Tune-up for Tor: Improving Security and Performance in the Tor Network (2008) (163)
- Denial of service or denial of security? (2007) (161)
- Cirripede: circumvention infrastructure using router redirection with plausible deniability (2011) (144)
- Detecting AI Trojans Using Meta Neural Analysis (2019) (143)
- Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components (2014) (138)
- DECENT: A decentralized architecture for enforcing privacy in online social networks (2011) (136)
- FlyByNight: mitigating the privacy risks of social networking (2008) (136)
- RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows (2009) (134)
- Cachet: a decentralized architecture for privacy preserving social networking with caching (2012) (129)
- Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses (2016) (120)
- Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting (2011) (119)
- Generic Application-Level Protocol Analyzer and its Language (2007) (117)
- Stegobot: A Covert Social Network Botnet (2011) (102)
- I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention (2013) (102)
- SWIRL: A Scalable Watermark to Detect Correlated Network Flows (2011) (100)
- ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies (2009) (98)
- Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems (2016) (94)
- PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval (2011) (93)
- CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing (2012) (92)
- Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity (2007) (89)
- Secloud: A cloud-based comprehensive and lightweight security solution for smartphones (2013) (85)
- Multi-flow Attacks Against Network Flow Watermarking Schemes (2008) (84)
- DP5: A Private Presence Service (2015) (70)
- SybilControl: practical sybil defense with computational puzzles (2012) (67)
- Fingerprinting websites using remote traffic analysis (2010) (65)
- The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors (2018) (65)
- Website Detection Using Remote Traffic Analysis (2011) (63)
- Pisces: Anonymous Communication Using Social Networks (2012) (59)
- CoCo: Coding-Based Covert Timing Channels for Network Flows (2011) (57)
- Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild (2019) (56)
- Breaking the Collusion Detection Mechanism of MorphMix (2006) (56)
- Improving Security and Performance in the Tor Network through Tunable Path Selection (2011) (55)
- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises (2017) (54)
- Querying Large Collections of Music for Similarity (2000) (54)
- Differentially Private Data Generative Models (2018) (53)
- EigenSpeed: secure peer-to-peer bandwidth evaluation (2009) (51)
- Privacy-Preserving Friends Troubleshooting Network (2005) (47)
- Multiplicative Differentials (2002) (46)
- X-Vine: Secure and Pseudonymous Routing Using Social Networks (2011) (46)
- Fixing Races for Fun and Profit: How to Abuse atime (2005) (46)
- rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation (2013) (44)
- Defending Tor from Network Adversaries: A Case Study of Network Path Prediction (2014) (43)
- In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems (2010) (42)
- Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks (2010) (42)
- SWEET: Serving the Web by Exploiting Email Tunnels (2012) (41)
- Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems (2012) (40)
- Non-Blind Watermarking of Network Flows (2012) (40)
- Ninja: A Framework for Network Services (2002) (39)
- Information leaks in structured peer-to-peer anonymous communication systems (2008) (39)
- The Need for Flow Fingerprints to Link Correlated Network Flows (2013) (39)
- Multi-flow attack resistant watermarks for network flows (2009) (36)
- Octopus: A Secure and Anonymous DHT Lookup (2012) (31)
- Outsourcing Security Analysis with Anonymized Logs (2006) (31)
- Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting (2015) (31)
- PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption (2012) (30)
- Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures (2018) (29)
- X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks (2012) (28)
- A privacy-preserving interdomain audit framework (2006) (28)
- High-Speed Matching of Vulnerability Signatures (2008) (28)
- Anonymity in Structured Peer-to-Peer Networks (2003) (27)
- On the Optimal Path Length for Tor (2010) (25)
- Protecting location privacy against inference attacks (2010) (25)
- Secure aggregation in a publish-subscribe system (2008) (24)
- BotMosaic: Collaborative network watermark for the detection of IRC-based botnets (2013) (22)
- Fingerprinting Smart Devices Through Embedded Acoustic Components (2014) (21)
- An ISP-Scale Deployment of TapDance (2018) (21)
- Assessing the Privacy Benefits of Domain Name Encryption (2019) (20)
- Active Certificates: A Framework for Delegation (2002) (19)
- Examining users' attitude towards privacy preserving collaborative filtering (2007) (19)
- Proceedings of the 2012 ACM workshop on Privacy in the electronic society (2012) (17)
- P3CA: Private Anomaly Detection Across ISP Networks (2011) (15)
- BotGrep : Finding Bots with Structured Graph Analysis (2010) (15)
- SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts (2017) (15)
- IP over Voice-over-IP for censorship circumvention (2012) (13)
- What can you learn from an IP? (2019) (13)
- Poster : Fingerprinting Smartphones Through Speaker (2014) (12)
- Conjure: Summoning Proxies from Unused Address Space (2019) (12)
- Security of the WEP algorithm (Wired Equivalent Privacy) (2002) (12)
- Enabling PrivacyPreserving PrivacyPreserving PrivacyPreserving Incentives for Mobile Crowd Sensing Systems (2016) (12)
- Securing Anonymous Communication Channels under the Selective DoS Attack (2013) (11)
- Scalable Anonymous Communication with Provable Security (2010) (11)
- Deleting index entries from compliance storage (2008) (10)
- An Analysis of Parallel Mixing with Attacker-Controlled Inputs (2005) (10)
- Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society (2009) (10)
- Improving multi-tier security using redundant authentication (2007) (9)
- Towards improving network flow watermarks using the repeat-accumulate codes (2011) (9)
- Confidentiality-preserving distributed proofs of conjunctive queries (2009) (9)
- Smartphone Fingerprinting Via Motion Sensors: Analyzing Feasiblity at Large-Scale and Studing Real Usage Patterns (2016) (8)
- Running Refraction Networking for Real (2020) (8)
- Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance (2008) (8)
- A Low-Cost Side Channel Traffic Analysis Attack in Packet Networks (2009) (7)
- Securing Tor Tunnels under the Selective-DoS Attack (2011) (7)
- Re3: relay reliability reputation for anonymity systems (2014) (7)
- InterceptingMobile Communications: TheInsecurityof 802.11 —DRAFT— (2001) (6)
- TightRope: Towards Optimal Load-balancing of Paths in Anonymous Networks (2018) (5)
- International workshop on hot topics in Peer-to-Peer systems - HOTP2P (2009) (5)
- Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures (2012) (5)
- Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers (2007) (4)
- BotMosaic: Collaborative Network Watermark for Botnet Detection (2012) (4)
- Enhancing Security and Privacy in Online Social Networks (2012) (3)
- Preventing SSL Traffic Analysis with Realistic Cover Traffic (extended abstract) (2009) (3)
- Confidentiality-preserving proof theories for distributed proof systems (2011) (3)
- Measuring the Impact of HTTP / 2 and Server Push on Web Fingerprinting (2019) (3)
- 11th workshop on privacy in the electronic society (2012) (3)
- On the channel capacity of network flow watermarking (2009) (3)
- Proceedings of the 7th international conference on Privacy enhancing technologies (2006) (2)
- A Decentralized Architecture for Enforcing Privacy in Online Social Networks (2011) (2)
- Confidentiality-Preserving Distributed Proofs of Conjunctive Queries ( Extended Version ) (2008) (2)
- Protecting location privacy against inference attacks (2010) (2)
- MLEFlow: Learning from History to Improve Load Balancing in Tor (2021) (2)
- Stegobot: building unobservable communication networks using social network behavior (2011) (2)
- Attacking and Repairing the Improved ModOnions Protocol (2009) (2)
- Byzantine attacks on anonymity systems (2007) (2)
- Safety in discretionary access control for logic-based publish-subscribe systems (2009) (2)
- Preventing encrypted traffic analysis (2011) (1)
- Trustworthy and scalable anonymous communication (2012) (1)
- A Crawl of the Mobile Web Measuring Sensor Accesses (2018) (1)
- Privacy Aware Feature Selection : An Application to Protecting Motion Data (2015) (1)
- Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings (2008) (1)
- Denial of Service or Denial of Security? How Attacks can Compromize Anonymity (2007) (1)
- Conjure (2019) (1)
- Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach (2010) (1)
- Stegobot: construction of an unobservable communication network leveraging social behavior (2011) (1)
- Single-bit re-encryption with applications to distributed proof systems (2007) (1)
- Janus: Privacy-Preserving Billing for Dynamic Charging of Electric Vehicles (2019) (1)
- Challenges in Wireless Security (2004) (0)
- Session details: Privacy protocols (2010) (0)
- ProbFlow : Using Probabilistic Programming in Anonymous Communication Networks (2023) (0)
- Provable Security (2018) (0)
- POSTER: PnP: improving web browsing performance over tor using web resource prefetch-and-push (2013) (0)
- Peer Review Process (2020) (0)
- DiProber: Using Dual Probing to Estimate Tor Relay Capacities in Underloaded Networks (2022) (0)
- Analyzing an adaptive reputation metric for anonymity systems (2014) (0)
- Protecting privacy of GPS traces against inference attacks (モバイルマルチメディア通信) (2010) (0)
- Lecture Notes in Computer Science: Foreward (2008) (0)
- Program Committee (2022) (0)
- Re 3 : Re lay Re liability Re putation for Anonymity Systems (2014) (0)
- Differentially Private Data Sharing: Sharing Models versus Sharing Data (2019) (0)
- Acknowledgement (2010) (0)
- An Architecture for Power Analysis Resistant Smart Cards (0)
- INTERNATIONAL STANDARDIZATION AND INFORMATION SECURITY (2017) (0)
- Session details: Session 2B: Differential Privacy 1 (2018) (0)
- A Secure Remote Filesystem (1998) (0)
- Session details: Applied cryptography I (2010) (0)
- Anonymity in Structured Peer-to-Peer Networks Ph.D. Qualifying Exam Proposal (2004) (0)
- Session details: Anonymous ommunications (2007) (0)
- Session management for accountability in distributed multimedia services (2009) (0)
- Session details: Session 1D: ML for Deanonymization (2018) (0)
- Using Private Information Retrieval (2011) (0)
- Session details: Privacy metrics and techniques (2009) (0)
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Foreword (2007) (0)
This paper list is powered by the following services:
Other Resources About Nikita Borisov
What Schools Are Affiliated With Nikita Borisov?
Nikita Borisov is affiliated with the following schools: