Follow
Zi Lin
Title
Cited by
Cited by
Year
Efficient private proximity testing with gsm location sketches
Z Lin, D Foo Kune, N Hopper
International Conference on Financial Cryptography and Data Security, 73-88, 2012
642012
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
Q Wang, Z Lin, N Borisov, NJ Hopper
NDSS 2013, 0
48*
Jack: Scalable accumulator-based Nymble system
Z Lin, N Hopper
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
452010
New attacks on timing-based network flow watermarks
Z Lin, N Hopper
21st USENIX Security Symposium (USENIX Security 12), 381-396, 2012
242012
On par for attack
C Arnold, R Jansen, Z Lin, J Parker
Tech. rep.(May 2009), 2009
12009
Toward Building Practical Privacy Enhancing Technologies
Z Lin
University of Minnesota, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–6