Matthew K Wright
Matthew K Wright
Director of the Center for Cybersecurity at Rochester Institute of Technology
Verified email at rit.edu - Homepage
TitleCited byYear
Timing attacks in low-latency mix systems
BN Levine, MK Reiter, C Wang, M Wright
Financial Cryptography (FC 2004), 251-265, 2004
3882004
An analysis of the degradation of anonymous protocols
M Wright, M Adler, BN Levine, C Shields
ISOC Symposium on Network and Distributed Systems Security (NDSS 2002), 39-50, 2002
2682002
Location privacy in sensor networks against a global eavesdropper
K Mehta, D Liu, M Wright
IEEE International Conference on Network Protocols (ICNP 2007), 314-323, 2007
2672007
The predecessor attack: An analysis of a threat to anonymous communications systems
MK Wright, M Adler, BN Levine, C Shields
ACM Transactions on Information and System Security (TISSEC) 7 (4), 489-522, 2004
2452004
Defending anonymous communications against passive logging attacks
M Wright, M Adler, BN Levine, C Shields
IEEE Symposium on Security and Privacy (S&P 2003), 28-41, 2003
2112003
Salsa: A structured approach to large-scale anonymity
A Nambiar, M Wright
ACM Conference on Computer and Communications Security (CCS 2006), 17-26, 2006
1812006
Protecting location privacy in sensor networks against a global eavesdropper
K Mehta, D Liu, M Wright
IEEE Transactions on Mobile Computing (TMC) 11 (2), 320-336, 2012
1722012
Fast detection of replica node attacks in mobile sensor networks using sequential analysis
JW Ho, M Wright, SK Das
IEEE INFOCOM 2009, 1773-1781, 2009
1092009
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks
JW Ho, D Liu, M Wright, SK Das
Ad Hoc Networks 7 (8), 1476-1488, 2009
852009
Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing
JW Ho, M Wright, SK Das
IEEE Transactions on Mobile Computing (TMC) 10 (6), 767-782, 2011
722011
WTF-PAD: Toward an Efficient Website Fingerprinting Defense
M Juarez, M Imani, M Perry, C Diaz, M Wright
ESORICS, 27-46, 2016
66*2016
ZoneTrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing
JW Ho, M Wright, SK Das
IEEE Transactions on Dependable and Secure Computing (TDSC) 9 (4), 494-511, 2012
552012
Pisces: Anonymous Communication Using Social Networks
P Mittal, M Wright, N Borisov
ISOC Network and Distributed Systems Security Symposium (NDSS 2013), 2013
532013
Using data mules to preserve source location privacy in wireless sensor networks
N Li, M Raj, D Liu, M Wright, SK Das
International Conference on Distributed Computing and Networking (ICDCN 2012 …, 2012
48*2012
Passive-logging attacks against anonymous communications systems
MK Wright, M Adler, BN Levine, C Shields
ACM Transactions on Information and System Security (TISSEC) 11 (2), 3, 2008
472008
A study of user password strategy for multiple accounts
SMT Haque, M Wright, S Scielzo
ACM Conference on Data and Application Security and Privacy (CODASPY 2013 …, 2013
382013
Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks
M Raj, N Li, D Liu, M Wright, SK Das
Pervasive and Mobile Computing 11 (1), 244-260, 2014
352014
Liquid: A detection-resistant covert timing channel based on IPD shaping
RJ Walls, K Kothari, M Wright
Computer Networks 55 (6), 1217-1228, 2011
332011
Distributed detection of mobile malicious node attacks in wireless sensor networks
JW Ho, M Wright, SK Das
Ad Hoc Networks 10 (3), 512-523, 2012
322012
Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues
MN Al-Ameen, S Scielzo, M Wright
ACM Conference on Human Factors in Computing Systems (CHI), 2315-2324, 2015
312015
The system can't perform the operation now. Try again later.
Articles 1–20