Rishab Nithyanand
Rishab Nithyanand
Assistant Professor @ University of Iowa
Verified email at uiowa.edu - Homepage
Title
Cited by
Cited by
Year
Effective Attacks and Provable Defenses for Website Fingerprinting
T Wang, X Cai, R Nithyanand, R Johnson, I Goldberg
USENIX Security, 2014
2332014
A systematic approach to developing and evaluating website fingerprinting defenses
X Cai, R Nithyanand, T Wang, R Johnson, I Goldberg
ACM CCS, 2014
1232014
CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
X Cai, R Nithyanand, R Johnson
WPES, 2014
892014
Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem
A Razaghpanah, R Nithyanand, N Vallina-Rodriguez, S Sundaresan, ...
25th Annual Network and Distributed System Security, NDSS 2018, 2018
872018
Adblocking and Counter Blocking: A Slice of the Arms Race.
R Nithyanand, S Khattak, M Javed, N Vallina-Rodriguez, M Falahrastegar, ...
USENIX FOCI, 2016
602016
Groupthink: usability of secure group association for wireless devices
R Nithyanand, N Saxena, G Tsudik, E Uzun
ACM UbiComp, 331-340, 2010
502010
Glove: A Bespoke Website Fingerprinting Defense
R Nithyanand, X Cai, R Johnson
WPES, 2014
482014
Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem
N Vallina-Rodriguez, S Sundaresan, A Razaghpanah, R Nithyanand, ...
arXiv preprint arXiv:1609.07190, 2016
412016
Measuring and mitigating AS-level adversaries against Tor
R Nithyanand, O Starov, A Zair, P Gill, M Schapira
NDSS, 2016
41*2016
A Survey on the Evolution of Cryptographic Protocols in ePassports
R Nithyanand
IACR Cryptology ePrint Archive 2009 (200), 2009
34*2009
Readers behaving badly
R Nithyanand, G Tsudik, E Uzun
European Symposium on Research in Computer Security, 19-36, 2010
292010
A Theoretical Analysis: Physical Unclonable Functions and The Software Protection Problem
R Nithyanand, J Solis
IEEE S&P Workshops, 2012
25*2012
Games Without Frontiers: Investigating Video Games as a Covert Channel
B Hahn, R Nithyanand, P Gill, R Johnson
IEEE EuroS&P, 2016
242016
Characterizing the Nature and Dynamics of Tor Exit Blocking
R Singh, R Nithyanand, S Afroz, P Pearce, MC Tschantz, P Gill, V Paxson
26th USENIX Security Symposium (USENIX Security 17), 2017
232017
Online Political Discourse in the Trump Era
R Nithyanand, B Schaffner, P Gill
arXiv preprint arXiv:1711.05303, 2017
212017
Can Jannie verify? Usability of display-equipped RFID tags for security purposes
A Kobsa, R Nithyanand, G Tsudik, E Uzun
Journal of Computer Security 21 (3), 347-370, 2013
20*2013
Exploring the Design Space of Longitudinal Censorship Measurement Platforms
A Razaghpanah, A Li, A FilastÚ, R Nithyanand, V Ververis, W Scott, P Gill
arXiv preprint arXiv:1606.01979, 2016
14*2016
Fuzzy Privacy Preserving Peer-to-Peer Reputation Management.
R Nithyanand, K Raman
IACR Cryptology ePrint Archive 2009, 442, 2009
122009
The password allocation problem: strategies for reusing passwords effectively
R Nithyanand, R Johnson
WPES, 2013
82013
User-aided reader revocation in PKI-based RFID systems
R Nithyanand, G Tsudik, E Uzun
Journal of Computer Security 19 (6), 1147-1172, 2011
82011
The system can't perform the operation now. Try again later.
Articles 1–20