Efficient private proximity testing with gsm location sketches Z Lin, D Foo Kune, N Hopper International Conference on Financial Cryptography and Data Security, 73-88, 2012 | 64 | 2012 |
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Q Wang, Z Lin, N Borisov, NJ Hopper NDSS 2013, 0 | 48* | |
Jack: Scalable accumulator-based Nymble system Z Lin, N Hopper Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010 | 45 | 2010 |
New attacks on timing-based network flow watermarks Z Lin, N Hopper 21st USENIX Security Symposium (USENIX Security 12), 381-396, 2012 | 24 | 2012 |
On par for attack C Arnold, R Jansen, Z Lin, J Parker Tech. rep.(May 2009), 2009 | 1 | 2009 |
Toward Building Practical Privacy Enhancing Technologies Z Lin University of Minnesota, 2012 | | 2012 |