Clay Shields
Clay Shields
Verified email at georgetown.edu - Homepage
TitleCited byYear
A secure routing protocol for ad hoc networks
K Sanzgiri, B Dahill, BN Levine, C Shields, EM Belding-Royer
10th IEEE International Conference on Network Protocols, 2002. Proceedings …, 2002
19982002
IP covert timing channels: design and detection
S Cabuk, CE Brodley, C Shields
Proceedings of the 11th ACM conference on Computer and communications …, 2004
4732004
Authenticated routing for ad hoc networks
K Sanzgiri, D LaFlamme, B Dahill, BN Levine, C Shields, ...
IEEE Journal on selected areas in communications 23 (3), 598-610, 2005
3902005
A protocol for anonymous communication over the Internet
C Shields, BN Levine
ACM Conference on Computer and Communications Security, 33-42, 2000
3302000
A survey of solutions to the sybil attack
BN Levine, C Shields, NB Margolin
University of Massachusetts Amherst, Amherst, MA 7, 224, 2006
2692006
An Analysis of the Degradation of Anonymous Protocols.
MK Wright, M Adler, BN Levine, C Shields
NDSS 2, 39-50, 2002
2682002
The predecessor attack: An analysis of a threat to anonymous communications systems
MK Wright, M Adler, BN Levine, C Shields
ACM Transactions on Information and System Security (TISSEC) 7 (4), 489-522, 2004
2452004
Detecting the sybil attack in mobile ad hoc networks
C Piro, C Shields, BN Levine
2006 Securecomm and Workshops, 1-11, 2006
2122006
Defending anonymous communications against passive logging attacks
M Wright, M Adler, BN Levine, C Shields
2003 Symposium on Security and Privacy, 2003., 28-41, 2003
2112003
Hidden voice commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 513-530, 2016
2062016
Responder anonymity and anonymous peer-to-peer file sharing
V Scarlata, BN Levine, C Shields
Proceedings Ninth International Conference on Network Protocols. ICNP 2001 …, 2001
1942001
Hordes: a multicast based protocol for anonymity 1
BN Levine, C Shields
Journal of Computer Security 10 (3), 213-240, 2002
1522002
IP covert channel detection
S Cabuk, CE Brodley, C Shields
ACM Transactions on Information and System Security (TISSEC) 12 (4), 22, 2009
1372009
The ordered core based tree protocol
C Shields, JJ Garcia-Luna-Aceves
Proceedings of INFOCOM'97 2, 884-891, 1997
1321997
KHIP—a scalable protocol for secure multicast routing
C Shields, JJ Garcia-Luna-Aceves
ACM SIGCOMM Computer Communication Review 29 (4), 53-64, 1999
1061999
Tracing the source of network attack: A technical, legal and societal problem
SC Lee, C Shields
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security 6, 2001
742001
Cocaine noodles: exploiting the gap between human and machine speech recognition
T Vaidya, Y Zhang, M Sherr, C Shields
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
602015
A system for the proactive, continuous, and efficient collection of digital forensic evidence
C Shields, O Frieder, M Maloof
Digital investigation 8, S3-S13, 2011
532011
HIP—a protocol for hierarchical multicast routing
C Shields, JJ Garcia-Luna-Aceves
Computer Communications 23 (7), 628-641, 2000
492000
Passive-logging attacks against anonymous communications systems
MK Wright, M Adler, BN Levine, C Shields
ACM Transactions on Information and System Security (TISSEC) 11 (2), 3, 2008
472008
The system can't perform the operation now. Try again later.
Articles 1–20