Anne Edmundson

According to our database1, Anne Edmundson authored at least 17 papers between 2012 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Decentralized Control: A Case Study of Russia.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Oblivious DNS: Practical Privacy for DNS Queries.
Proc. Priv. Enhancing Technol., 2019

Oblivious DNS: practical privacy for DNS queries: published in PoPETS 2019.
Proceedings of the Applied Networking Research Workshop, 2019

2018
Privacy Infrastructure for Content and Communications
PhD thesis, 2018

Oblivious DNS: Practical Privacy for DNS Queries.
CoRR, 2018

How Do Tor Users Interact With Onion Services?
Proceedings of the 27th USENIX Security Symposium, 2018

Bamboozling Certificate Authorities with BGP.
Proceedings of the 27th USENIX Security Symposium, 2018

Nation-State Hegemony in Internet Routing.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

Cross-App Poisoning in Software-Defined Networking.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
OCDN: Oblivious Content Distribution Networks.
CoRR, 2017

Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
Characterizing and Avoiding Routing Detours Through Surveillance States.
CoRR, 2016

A First Look into Transnational Routing Detours.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

2015
RAPTOR: Routing Attacks on Privacy in Tor.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
Security Audit of Safeplug "Tor in a Box".
Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014

2013
An Empirical Study on the Effectiveness of Security Code Review.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

2012
Automated Analysis of Election Audit Logs.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012


  Loading...