The Loopix Anonymity System A Piotrowska, J Hayes, T Elahi, S Meiser, G Danezis 26th USENIX Security Symposium USENIX Security 17, 1199-1216, 2017 | 211 | 2017 |
Changing of the guards: A framework for understanding and improving entry guard selection in Tor T Elahi, K Bauer, M AlSabah, R Dingledine, I Goldberg Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 43-54, 2012 | 119 | 2012 |
Inside Job: Applying Traffic Analysis to Measure Tor from Within R Jansen, M Juarez, R Gálvez, T Elahi, C Diaz Network and Distributed System Security Symposium, 2018 | 95 | 2018 |
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks T Elahi, G Danezis, I Goldberg 21st ACM Conference on Computer and Communications Security, 2014 | 90 | 2014 |
The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting M Alsabah, K Bauer, T Elahi, I Goldberg Privacy Enhancing Technologies Symposium, 143-163, 2013 | 86* | 2013 |
SoK: Making Sense of Censorship Resistance Systems S Khattak, T Elahi, L Simon, CM Swanson, SJ Murdoch, I Goldberg Proceedings on Privacy Enhancing Technologies 2016 (4), 37-61, 2016 | 63 | 2016 |
Privacy assurance: bridging the gap between preference and practice TE Elahi, S Pearson International Conference on Trust, Privacy and Security in Digital Business …, 2007 | 22 | 2007 |
Cordon–a taxonomy of Internet censorship resistance strategies T Elahi, I Goldberg University of Waterloo CACR 2012-33, 2012 | 18 | 2012 |
A Framework for the Game-theoretic Analysis of Censorship Resistance T Elahi, JA Doucette, H Hosseini, SJ Murdoch, I Goldberg Proceedings on Privacy Enhancing Technologies 2016 (4), 83-101, 2016 | 11 | 2016 |
Towards flexible anonymous networks F Rochet, T Elahi arXiv preprint arXiv:2203.03764, 2022 | 10 | 2022 |
Slipping Past the Cordon: A Systematization of Internet Censorship Resistance T Elahi, CM Swanson, I Goldberg University of Waterloo CACR 2015-10, 2015 | 10 | 2015 |
Poster: Fingerprinting hidden service circuits from a tor middle relay M Juarez, T Elahi, R Jansen, C Diaz, R Galvez, M Wright Proceedings of IEEE S&P, 2017 | 4 | 2017 |
Privacy Preserving Detection of Path Bias Attacks in Tor. L Watson, A Mediratta, T Elahi, R Sarkar Proceedings on Privacy Enhancing Technologies 2020 (4), 111-130, 2020 | 2 | 2020 |
Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering. X Ma, F Rochet, T Elahi Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 1 | 2022 |
Building A privacy testbed: Use cases and design considerations J Gardiner, P Das Chowdhury, J Halsey, M Tahaei, T Elahi, A Rashid European Symposium on Research in Computer Security, 185-193, 2021 | 1 | 2021 |
Privacy assurance checking S Pearson, T Elahi Digital Privacy: PRIME-Privacy and Identity Management for Europe, 427-456, 2011 | 1 | 2011 |
Connecting the Dots in the Sky: Website Fingerprinting in Low Earth Orbit Satellite Internet P Singh, D Barradas, T Elahi, N Limam Workshop on the Security of Space and Satellite Systems, 2024 | | 2024 |
Accelerated Shapley Value Approximation for Data Evaluation L Watson, Z Kujawa, R Andreeva, HT Yang, T Elahi, R Sarkar arXiv preprint arXiv:2311.05346, 2023 | | 2023 |
VeraSel: Verifiable Random Selection for Mixnets Construction X Ma, F Rochet, T Elahi arXiv preprint arXiv:2301.09207, 2023 | | 2023 |