Eric Chan-Tin
Eric Chan-Tin
Assistant Professor of Computer Science, Loyola University Chicago
Verified email at cs.luc.edu - Homepage
Title
Cited by
Cited by
Year
How much anonymity does network latency leak?
N Hopper, EY Vasserman, E Chan-Tin
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010
2852010
How much anonymity does network latency leak?
N Hopper, EY Vasserman, E Chan-Tin
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2852007
Attacking the kad network
P Wang, J Tyra, E Chan-Tin, T Malchow, DF Kune, N Hopper, Y Kim
Proceedings of the 4th international conference on Security and privacy in …, 2008
802008
Towards complete node enumeration in a peer-to-peer botnet
BBH Kang, E Chan-Tin, CP Lee, J Tyra, HJ Kang, C Nunnery, Z Wadler, ...
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
742009
DP-ADMM: ADMM-based distributed learning with differential privacy
Z Huang, R Hu, Y Guo, E Chan-Tin, Y Gong
IEEE Transactions on Information Forensics and Security 15, 1002-1012, 2019
532019
The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems
E Chan-Tin, D Feldman, N Hopper, Y Kim
International Conference on Security and Privacy in Communication Systems …, 2009
482009
The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems
E Chan-Tin, D Feldman, N Hopper, Y Kim
International Conference on Security and Privacy in Communication Systems …, 2009
482009
Why Kad lookup fails
HJ Kang, E Chan-Tin, NJ Hopper, Y Kim
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 121-130, 2009
412009
Introducing a distributed cloud architecture with efficient resource discovery and optimal resource allocation
P Khethavath, J Thomas, E Chan-Tin, H Liu
2013 IEEE Ninth World Congress on Services, 386-392, 2013
332013
The frog-boiling attack: Limitations of secure network coordinate systems
E Chan-Tin, V Heorhiadi, N Hopper, Y Kim
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-23, 2011
322011
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
E Chan-Tin, V Heorhiadi, N Hopper, Y Kim
ACM Transactions on Information and System Security (TISSEC) 14 (3), 27, 2011
322011
Accurate and Provably Secure Latency Estimation with Treeple.
E Chan-Tin, N Hopper
NDSS, 2011
272011
Development of a virtual reality based simulation environment for orthopedic surgical training
J Cecil, MBBR Kumar, A Gupta, M Pirela-Cruz, E Chan-Tin, J Yu
OTM Confederated International Conferences" On the Move to Meaningful …, 2016
152016
Revisiting circuit clogging attacks on Tor
E Chan-Tin, J Shin, J Yu
2013 International Conference on Availability, Reliability and Security, 131-140, 2013
142013
Identifying webbrowsers in encrypted communications
J Yu, E Chan-Tin
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 135-138, 2014
132014
Towards an efficient distributed cloud computing architecture
P Khethavath, JP Thomas, E Chan-tin
Peer-to-Peer Networking and Applications 10 (5), 1152-1168, 2017
122017
Why we hate IT: two surveys on pre‐generated and expiring passwords in an academic setting
M Farcasin, E Chan‐tin
Security and Communication Networks 8 (13), 2361-2373, 2015
122015
SmartPass: a smarter geolocation‐based authentication scheme
J Shin, S Kancharlapalli, M Farcasin, E Chan‐Tin
Security and Communication Networks 8 (18), 3927-3938, 2015
102015
Attacking the kad network—real world evaluation and high fidelity simulation using DVN
P Wang, J Tyra, E Chan‐Tin, T Malchow, DF Kune, N Hopper, Y Kim
Security and Communication Networks 6 (12), 1556-1575, 2013
102013
Revisiting Assumptions for Website Fingerprinting Attacks
W Cui, T Chen, C Fields, J Chen, A Sierra, E Chan-Tin
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
92019
The system can't perform the operation now. Try again later.
Articles 1–20