| 2004 | [Punishing the Innocent along with the Guilty The Economics of Individual versus Group Punishment](2004-Punishing_the_Innocent_along_with_the_Guilty_The_Economics_of_Individual_versus_Group_Punishment.pdf) |
| 2004 | [Tor The Second-Generation Onion Router](2004-Tor_The_Second-Generation_Onion_Router.pdf) |
| 2008 | [Shining Light in Dark Places Understanding the Tor Network](2008-Shining_Light_in_Dark_Places_Understanding_the_Tor_Network.pdf) |
| 2010 | [Digging into Anonymous Traffic deep analysis of the Tor anonymizing network](2010-Digging_into_Anonymous_Traffic_deep_analysis_of_the_Tor_anonymizing_network.pdf) |
| 2013 | [Matching Known Patients to Health Records in Washington State Data](2013-Matching_Known_Patients_to_Health_Records_in_Washington_State_Data.pdf) |
| 2013 | [Trawling for Tor Hidden Services Detection Measurement Deanonymization](2013-Trawling_for_Tor_Hidden_Services_Detection_Measurement_Deanonymization.pdf) |
| 2013 | [Users Get Routed Traffic Correlation on Tor by Realistic Adversaries](2013-Users_Get_Routed_Traffic_Correlation_on_Tor_by_Realistic_Adversaries.pdf) |
| 2014 | [EU WP216 Article 29 Data Protection Working Party](2014-euWP216_Article_29_Data_Protection_Working_Party.pdf) |
| 2014 | [Effective Attacks and Provable Defenses for Website Fingerprinting](2014-Effective_Attacks_and_Provable_Defenses_for_Website_Fingerprinting.pdf) |
| 2014 | [Identity Theft Threat and Mitigations](2014-Identity_Theft_Threat_and_Mitigations.pdf) |
| 2014 | [InTeRneT SpyIng In SAn FRAnCISCo](2014-InTeRneT_SpyIng_In_SAn_FRAnCISCo.pdf) |
| 2014 | [Practical Attacks Against The I2P Network](2014-Practical_Attacks_Against_The_I2P_Network.pdf) |
2021-05-21 06:21:26 +00:00
| 2014 | [The Origin and Reception of Martin Niemöller's Quotation First they came for the communists](2014-The_Origin_and_Reception_of_Martin_Niemöller's_Quotation_First_they_came_for_the_communists.pdf) |
| 2016 | [The Crime of Speech How Arab Governments Use the Law to Silence Expression Online](2016-The_Crime_of_Speech_How_Arab_Governments_Use_the_Law_to_Silence_Expression_Online.pdf) |
| 2018 | [Dropping on the Edge Flexibility and Traffic Confirmation in Onion Routing Protocols](2018-Dropping_on_the_Edge_Flexibility_and_Traffic_Confirmation_in_Onion_Routing_Protocols.pdf) |
| 2019 | [Analyzing Chinas Blocking of Unpublished Tor Bridges](2019-Analyzing_Chinas_Blocking_of_Unpublished_Tor_Bridges.pdf) |
2021-05-14 01:55:38 +00:00
| 2019 | [Estimating the success of re-identifications in incomplete datasets using generative models](2019-Estimating_the_success_of_re-identifications_in_incomplete_datasets_using_generative_models.pdf) |
2021-04-22 06:51:36 +00:00
| 2019 | [Something Dark INVESTIGATING IN THE DARK WEB](2019-Something_Dark_INVESTIGATING_IN_THE_DARK_WEB.pdf) |
| 2019 | [Watching You Watch The Tracking Ecosystem of Over-the-Top TV Streaming Devices](2019-Watching_You_Watch_The_Tracking_Ecosystem_of_Over-the-Top_TV_Streaming_Devices.pdf) |
| 2020 | [Collect it all everyday lives turned into passive signals intelligence](2020-Collect_it_all_everyday_lives_turned_into_passive_signals_intelligence.pdf) |
| 2020 | [Website Fingerprinting with Website Oracles](2020-Website_Fingerprinting_with_Website_Oracles.pdf) |
2021-04-10 00:58:34 +00:00
| 2020 | [Why We Still Cant Browse in Peace On the Uniqueness and Reidentifiability of Web Browsing Histories](2020-Why_We_Still_Cant_Browse_in_Peace_On_the_Uniqueness_and_Reidentifiability_of_Web_Browsing_Histories.pdf) |
2021-04-10 04:08:33 +00:00
| 2021 | [How Gamification Affects Software Developers Cautionary Evidence from a Natural Experiment on GitHub](2021-How_Gamification_Affects_Software_Developers_Cautionary_Evidence_from_a_Natural_Experiment_on_GitHub.pdf) |