Publications
Tracking the Role of Adversaries in Measuring Unwanted Traffic.
Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
(2006). Dissecting DNS Stakeholders in Mobile Networks.
Proceedings of CoNEXT.
(2017). Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps.
Proceedings on Privacy Enhancing Technologies. 2022, 250-273.
(2022).
(1991).
(1993). A graph-theoretic game and its application to the k-server problem.
SIAM Journal on Computing. 24(1), 78-100.
(1995).
(1997).
(1991). Abstract Interpretation of Stateful Networks.
Proceedings of SAS 2018.
(2018). A Method for Obtaining Randomized Algorithms with Small Tail Probabilities.
Algorithmica. 16(4-5), 543-547.
(1996).
(1991).
(2000). A Polyhedral Approach to Surface Reconstruction from Planar Contours.
Proceedings of the Ninth Conference on Integer Programming and Combinatorial Optimization.
(2002).
(2001).
(2000).
(2002).
(2001). TSP-Based Curve Reconstruction in Polynomial Time.
Proceedings of the Eleventh Symposium on Discrete Algorithms. 686-695.
(2000). A Combinatorial Approach to Protein Docking with Flexible Side-Chains.
Proceedings of the Fourth Annual International conference on Computational Molecular Biology (RECOMB-00).
(2000).
(1997).
(2012). Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016).
(2012).
(2013). Mission Accomplished? HTTPS Security after DigiNotar.
Proceedings of the IMC 2017.
(2017).