Rishab Nithyanand
Rishab Nithyanand
Assistant Professor @ University of Iowa
Verified email at uiowa.edu - Homepage
Title
Cited by
Cited by
Year
Effective Attacks and Provable Defenses for Website Fingerprinting
T Wang, X Cai, R Nithyanand, R Johnson, I Goldberg
USENIX Security, 2014
2222014
A systematic approach to developing and evaluating website fingerprinting defenses
X Cai, R Nithyanand, T Wang, R Johnson, I Goldberg
ACM CCS, 2014
1152014
CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
X Cai, R Nithyanand, R Johnson
WPES, 2014
862014
Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem
A Razaghpanah, R Nithyanand, N Vallina-Rodriguez, S Sundaresan, ...
25th Annual Network and Distributed System Security, NDSS 2018, 2018
71*2018
Adblocking and Counter Blocking: A Slice of the Arms Race.
R Nithyanand, S Khattak, M Javed, N Vallina-Rodriguez, M Falahrastegar, ...
USENIX FOCI, 2016
562016
Groupthink: usability of secure group association for wireless devices
R Nithyanand, N Saxena, G Tsudik, E Uzun
ACM UbiComp, 331-340, 2010
502010
Glove: A Bespoke Website Fingerprinting Defense
R Nithyanand, X Cai, R Johnson
WPES, 2014
482014
Measuring and mitigating AS-level adversaries against Tor
R Nithyanand, O Starov, A Zair, P Gill, M Schapira
NDSS, 2016
39*2016
Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem
N Vallina-Rodriguez, S Sundaresan, A Razaghpanah, R Nithyanand, ...
arXiv preprint arXiv:1609.07190, 2016
382016
A Survey on the Evolution of Cryptographic Protocols in ePassports
R Nithyanand
IACR Cryptology ePrint Archive 2009 (200), 2009
31*2009
Readers behaving badly
R Nithyanand, G Tsudik, E Uzun
European Symposium on Research in Computer Security, 19-36, 2010
292010
Games Without Frontiers: Investigating Video Games as a Covert Channel
B Hahn, R Nithyanand, P Gill, R Johnson
IEEE EuroS&P, 2016
242016
A Theoretical Analysis: Physical Unclonable Functions and The Software Protection Problem
R Nithyanand, J Solis
IEEE S&P Workshops, 2012
23*2012
Can Jannie verify? Usability of display-equipped RFID tags for security purposes
A Kobsa, R Nithyanand, G Tsudik, E Uzun
Journal of Computer Security 21 (3), 347-370, 2013
20*2013
Characterizing the Nature and Dynamics of Tor Exit Blocking
R Singh, R Nithyanand, S Afroz, P Pearce, MC Tschantz, P Gill, V Paxson
26th USENIX Security Symposium (USENIX Security 17), 2017
182017
Online Political Discourse in the Trump Era
R Nithyanand, B Schaffner, P Gill
arXiv preprint arXiv:1711.05303, 2017
162017
Exploring the Design Space of Longitudinal Censorship Measurement Platforms
A Razaghpanah, A Li, A FilastÚ, R Nithyanand, V Ververis, W Scott, P Gill
arXiv preprint arXiv:1606.01979, 2016
14*2016
Fuzzy Privacy Preserving Peer-to-Peer Reputation Management.
R Nithyanand, K Raman
IACR Cryptology ePrint Archive 2009, 442, 2009
122009
The password allocation problem: strategies for reusing passwords effectively
R Nithyanand, R Johnson
WPES, 2013
82013
User-aided reader revocation in PKI-based RFID systems
R Nithyanand, G Tsudik, E Uzun
Journal of Computer Security 19 (6), 1147-1172, 2011
72011
The system can't perform the operation now. Try again later.
Articles 1–20