| KIST: Kernel-Informed Socket Transport for Tor R Jansen, M Traudt, J Geddes, C Wacek, M Sherr, P Syverson ACM Transactions on Privacy and Security (TOPS) 22 (1), 3, 2018 | 32 | 2018 |
| Privacy-Preserving Dynamic Learning of Tor Network Traffic R Jansen, M Traudt, N Hopper Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 31 | 2018 |
| HSTS Supports Targeted Surveillance P Syverson, M Traudt 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18), 2018 | 21 | 2018 |
| Flashflow: A secure speed test for tor M Traudt, R Jansen, A Johnson 2021 IEEE 41st International Conference on Distributed Computing Systems …, 2021 | 19 | 2021 |
| Tor's been KIST: A case study of transitioning Tor research to practice R Jansen, M Traudt arXiv preprint arXiv:1709.01044, 2017 | 11 | 2017 |
| Self-authenticating traditional domain names P Syverson, M Traudt 2019 IEEE Cybersecurity Development (SecDev), 147-160, 2019 | 5 | 2019 |
| Does Pushing Security on Clients Make Them Safer? M Traudt, P Syverson | 2 | 2019 |