Kevin P. Dyer

According to our database1, Kevin P. Dyer authored at least 8 papers between 2012 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Marionette: A Programmable Network Traffic Obfuscation System.
Proceedings of the 24th USENIX Security Symposium, 2015

Seeing through Network-Protocol Obfuscation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond.
IACR Cryptol. ePrint Arch., 2014

Traffic Analysis of Encrypted Messaging Services: Apple iMessage and Beyond.
Comput. Commun. Rev., 2014

LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Protocol misidentification made easy with format-transforming encryption.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Format-Transforming Encryption: More than Meets the DPI.
IACR Cryptol. ePrint Arch., 2012

Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.
Proceedings of the IEEE Symposium on Security and Privacy, 2012


  Loading...