Follow
Tariq Elahi
Tariq Elahi
Other namesTariq Ehsan Elahi
Assistant Professor, School of Informatics - University of Edinburgh
Verified email at ed.ac.uk - Homepage
Title
Cited by
Cited by
Year
The Loopix Anonymity System
A Piotrowska, J Hayes, T Elahi, S Meiser, G Danezis
26th USENIX Security Symposium USENIX Security 17, 1199-1216, 2017
2042017
Changing of the guards: A framework for understanding and improving entry guard selection in Tor
T Elahi, K Bauer, M AlSabah, R Dingledine, I Goldberg
Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 43-54, 2012
1202012
Inside Job: Applying Traffic Analysis to Measure Tor from Within
R Jansen, M Juarez, R Gálvez, T Elahi, C Diaz
Network and Distributed System Security Symposium, 2018
972018
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks
T Elahi, G Danezis, I Goldberg
21st ACM Conference on Computer and Communications Security, 2014
902014
The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting
M Alsabah, K Bauer, T Elahi, I Goldberg
Privacy Enhancing Technologies Symposium, 143-163, 2013
85*2013
SoK: Making Sense of Censorship Resistance Systems
S Khattak, T Elahi, L Simon, CM Swanson, SJ Murdoch, I Goldberg
Proceedings on Privacy Enhancing Technologies 2016 (4), 37-61, 2016
612016
Privacy assurance: bridging the gap between preference and practice
TE Elahi, S Pearson
International Conference on Trust, Privacy and Security in Digital Business …, 2007
242007
Cordon–a taxonomy of Internet censorship resistance strategies
T Elahi, I Goldberg
University of Waterloo CACR 2012-33, 2012
182012
A Framework for the Game-theoretic Analysis of Censorship Resistance
T Elahi, JA Doucette, H Hosseini, SJ Murdoch, I Goldberg
Proceedings on Privacy Enhancing Technologies 2016 (4), 83-101, 2016
112016
Slipping Past the Cordon: A Systematization of Internet Censorship Resistance
T Elahi, CM Swanson, I Goldberg
University of Waterloo CACR 2015-10, 2015
102015
Towards flexible anonymous networks
F Rochet, T Elahi
arXiv preprint arXiv:2203.03764, 2022
52022
Poster: Fingerprinting hidden service circuits from a tor middle relay
M Juarez, T Elahi, R Jansen, C Diaz, R Galvez, M Wright
Proceedings of IEEE S&P, 2017
42017
Building A privacy testbed: Use cases and design considerations
J Gardiner, P Das Chowdhury, J Halsey, M Tahaei, T Elahi, A Rashid
European Symposium on Research in Computer Security, 185-193, 2021
22021
Privacy Preserving Detection of Path Bias Attacks in Tor.
L Watson, A Mediratta, T Elahi, R Sarkar
Proceedings on Privacy Enhancing Technologies 2020 (4), 111-130, 2020
22020
Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering.
X Ma, F Rochet, T Elahi
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
12022
Privacy assurance checking
S Pearson, T Elahi
Digital Privacy: PRIME-Privacy and Identity Management for Europe, 427-456, 2011
12011
Fingerprinting Hidden Service Circuits from a Tor Middle Relay
MJ Miro, R Jansen, R Galvez, T Elahi, C Diaz, M Wright
2017 IEEE Symposium on Security and Privacy, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–17