AnoA: A Framework For Analyzing Anonymous Communication Protocols M Backes, A Kate, P Manoharan, S Meiser, E Mohammadi 26th IEEE Computer Security Foundations Symposium (CSF), 163-178, 2013 | 139 | 2013 |
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two D Das, S Meiser, E Mohammadi, A Kate IEEE Symposium on Security and Privacy (SP), 2018 | 109 | 2018 |
Provably secure and practical onion routing M Backes, I Goldberg, A Kate, E Mohammadi 2012 IEEE 25th Computer Security Foundations Symposium, 369-385, 2012 | 80 | 2012 |
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy DM Sommer, S Meiser, E Mohammadi Proceedings on Privacy Enhancing Technologies 2019 (2), 245-269, 2019 | 78 | 2019 |
(Nothing else) MATor (s): Monitoring the Anonymity of Tor's Path Selection M Backes, A Kate, S Meiser, E Mohammadi Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 62 | 2014 |
Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy M Meiser, E Mohammadi 25th ACM Conference on Computer and Communications Security (CCS 2018), 2018 | 47 | 2018 |
Computationally sound abstraction and verification of secure multi-party computations M Backes, M Maffei, E Mohammadi Conference on Foundations of Software Technology and Theoretical Computer …, 2010 | 39 | 2010 |
Ace: an efficient key-exchange protocol for onion routing M Backes, A Kate, E Mohammadi ACM Workshop on Privacy in the Electronic Society (WPES), 55-64, 2012 | 36 | 2012 |
TUC: Time-sensitive and Modular Analysis of Anonymous Communication M Backes, P Manoharan, E Mohammadi IEEE Computer Security Foundations Symposium (CSF), 2014 | 32 | 2014 |
Responsible and regulatory conform machine learning for medicine: a survey of challenges and solutions E Petersen, Y Potdevin, E Mohammadi, S Zidowitz, S Breyer, D Nowotka, ... IEEE Access 10, 58375-58418, 2022 | 21 | 2022 |
Computational soundness results for ProVerif: bridging the gap from trace properties to uniformity M Backes, E Mohammadi, T Ruffing Principles of Security and Trust: Third International Conference, POST 2014 …, 2014 | 20* | 2014 |
Comprehensive anonymity trilemma: User coordination is not enough D Das, S Meiser, E Mohammadi, A Kate Proceedings on Privacy Enhancing Technologies, 2020 | 17 | 2020 |
Symbolic Malleable Zero-Knowledge Proofs M Backes, F Bendun, M Maffei, E Mohammadi, K Pecina Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 412-426, 2015 | 16* | 2015 |
Privacy-Preserving Accountable Computation M Backes, D Fiore, E Mohammadi 18th European Symposium on Research in Computer Security (ESORICS), 38--56, 2013 | 16 | 2013 |
Differential privacy with partial knowledge D Desfontaines, E Mohammadi, E Krahmer, D Basin arXiv preprint arXiv:1905.00650, 2019 | 11 | 2019 |
Divide and Funnel: a Scaling Technique for Mix-Networks D Das, S Meiser, E Mohammadi, A Kate Cryptology ePrint Archive, 2021 | 4 | 2021 |
Deniable Upload and Download via Passive Participation D Sommer, A Dhar, E Mohammadi, D Ronzani, S Capkun 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19), 2019 | 4* | 2019 |
Computational Soundness for Dalvik Bytecode M Backes, R Künnemann, E Mohammadi Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 4 | 2016 |
Zero-Communication Seed Establishment for Anti-Jamming Techniques K Pecina, E Mohammadi, C Pöpper NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014 | 4 | 2014 |
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor M Backes, S Koch, S Meiser, E Mohammadi, C Rossow Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 3 | 2015 |