Follow
Kevin Bauer
Kevin Bauer
MIT Lincoln Laboratory
Verified email at ll.mit.edu
Title
Cited by
Cited by
Year
Shining light in dark places: Understanding the Tor network
D McCoy, K Bauer, D Grunwald, T Kohno, D Sicker
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
6032008
Low-resource routing attacks against Tor
K Bauer, D McCoy, D Grunwald, T Kohno, D Sicker
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 11-20, 2007
4902007
Changing of the guards: A framework for understanding and improving entry guard selection in Tor
T Elahi, K Bauer, M AlSabah, R Dingledine, I Goldberg
Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 43-54, 2012
1232012
Congestion-aware path selection for Tor
T Wang, K Bauer, C Forero, I Goldberg
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
1212012
Enhancing Tor's performance using real-time traffic classification
M AlSabah, K Bauer, I Goldberg
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1152012
{ExperimenTor}: A testbed for safe and realistic tor experimentation
K Bauer, M Sherr, D Grunwald
4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011
1092011
An Empirical Evaluation of Relay Selection in Tor.
C Wacek, H Tan, KS Bauer, M Sherr
NDss, 2013
1082013
DefenestraTor: Throwing out windows in Tor
M AlSabah, K Bauer, I Goldberg, D Grunwald, D McCoy, S Savage, ...
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011
1002011
Methodically Modeling the Tor Network.
R Jansen, KS Bauer, N Hopper, R Dingledine
CSET, 2012
952012
The path less travelled: Overcoming Tor’s bottlenecks with traffic splitting
M AlSabah, K Bauer, T Elahi, I Goldberg
Privacy Enhancing Technologies: 13th International Symposium, PETS 2013 …, 2013
832013
Practical defenses for evil twin attacks in 802.11
H Gonzales, K Bauer, J Lindqvist, D McCoy, D Sicker
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
692010
Mitigating evil twin attacks in 802.11
K Bauer, H Gonzales, D McCoy
2008 IEEE International Performance, Computing and Communications Conference …, 2008
612008
Physical layer attacks on unlinkability in wireless lans
K Bauer, D McCoy, B Greenstein, D Grunwald, D Sicker
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
422009
Have no phear: Networks without identifiers
R Skowyra, K Bauer, V Dedhia, H Okhravi
Proceedings of the 2016 ACM workshop on moving target defense, 3-14, 2016
412016
The directional attack on wireless localization-or-how to spoof your location with a tin can
K Bauer, D McCoy, E Anderson, M Breitenbach, G Grudic, D Grunwald, ...
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
362009
BitBlender: Light-weight anonymity for BitTorrent
K Bauer, D McCoy, D Grunwald, D Sicker
Proceedings of the workshop on Applications of private and anonymous …, 2008
352008
Bitstalker: Accurately and efficiently monitoring bittorrent traffic
K Bauer, D McCoy, D Grunwald, D Sicker
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
342009
Moving target techniques: Leveraging uncertainty for cyber defense
H Okhravi, WW Streilein, KS Bauer
Lincoln Laboratory Journal 22 (1), 100-109, 2016
332016
A distributed authentication scheme for a wireless sensing system
K Bauer, H Lee
Proceedings of the 2nd International Workshop on Networked Sensing System …, 2005
282005
Predicting Tor path compromise by exit port
K Bauer, D Grunwald, D Sicker
2009 IEEE 28th International Performance Computing and Communications …, 2009
132009
The system can't perform the operation now. Try again later.
Articles 1–20