| Routing around decoys M Schuchard, J Geddes, C Thompson, N Hopper Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 117 | 2012 |
| Cover your ACKs: Pitfalls of covert channel censorship circumvention J Geddes, M Schuchard, N Hopper Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 112 | 2013 |
| Never been {KIST}:{Tor’s} congestion management blossoms with {Kernel-Informed} socket transport R Jansen, J Geddes, C Wacek, M Sherr, P Syverson 23rd USENIX Security Symposium (USENIX Security 14), 127-142, 2014 | 66 | 2014 |
| How low can you go: Balancing performance with anonymity in Tor J Geddes, R Jansen, N Hopper International Symposium on Privacy Enhancing Technologies Symposium, 164-184, 2013 | 50 | 2013 |
| IMUX: Managing tor connections from two to infinity, and beyond J Geddes, R Jansen, N Hopper Proceedings of the 13th Workshop on Privacy in the Electronic Society, 181-190, 2014 | 34 | 2014 |
| KISt: Kernel-informed socket transport for ToR R Jansen, M Traudt, J Geddes, C Wacek, M Sherr, P Syverson ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-37, 2018 | 32 | 2018 |
| Abra cadabra: Magically increasing network utilization in tor by avoiding bottlenecks J Geddes, M Schliep, N Hopper Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016 | 19 | 2016 |
| Anarchy in tor: Performance cost of decentralization J Geddes, M Schliep, N Hopper arXiv preprint arXiv:1606.02385, 2016 | 2 | 2016 |
| Privacy and Performance Trade-offs in Anonymous Communication Networks JD Geddes University of Minnesota, 2016 | 1 | 2016 |
| Appendices to Accompany" Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport" R Jansen, J Geddes, C Wacek, M Sherr, P Syverson | 1 | 2014 |
| The Cost of the Path Not Taken M Schuchard, J Geddes, M Schliep, N Hopper 2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016 | | 2016 |