Follow
Tariq Elahi
Tariq Elahi
Other namesTariq Ehsan Elahi
Assistant Professor, School of Informatics - University of Edinburgh
Verified email at ed.ac.uk - Homepage
Title
Cited by
Cited by
Year
The Loopix Anonymity System
A Piotrowska, J Hayes, T Elahi, S Meiser, G Danezis
26th USENIX Security Symposium USENIX Security 17, 1199-1216, 2017
2082017
Changing of the guards: A framework for understanding and improving entry guard selection in Tor
T Elahi, K Bauer, M AlSabah, R Dingledine, I Goldberg
Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 43-54, 2012
1192012
Inside Job: Applying Traffic Analysis to Measure Tor from Within
R Jansen, M Juarez, R Gálvez, T Elahi, C Diaz
Network and Distributed System Security Symposium, 2018
942018
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks
T Elahi, G Danezis, I Goldberg
21st ACM Conference on Computer and Communications Security, 2014
882014
The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting
M Alsabah, K Bauer, T Elahi, I Goldberg
Privacy Enhancing Technologies Symposium, 143-163, 2013
85*2013
SoK: Making Sense of Censorship Resistance Systems
S Khattak, T Elahi, L Simon, CM Swanson, SJ Murdoch, I Goldberg
Proceedings on Privacy Enhancing Technologies 2016 (4), 37-61, 2016
632016
Privacy assurance: bridging the gap between preference and practice
TE Elahi, S Pearson
International Conference on Trust, Privacy and Security in Digital Business …, 2007
222007
Cordon–a taxonomy of Internet censorship resistance strategies
T Elahi, I Goldberg
University of Waterloo CACR 2012-33, 2012
182012
A Framework for the Game-theoretic Analysis of Censorship Resistance
T Elahi, JA Doucette, H Hosseini, SJ Murdoch, I Goldberg
Proceedings on Privacy Enhancing Technologies 2016 (4), 83-101, 2016
112016
Slipping Past the Cordon: A Systematization of Internet Censorship Resistance
T Elahi, CM Swanson, I Goldberg
University of Waterloo CACR 2015-10, 2015
102015
Towards flexible anonymous networks
F Rochet, T Elahi
arXiv preprint arXiv:2203.03764, 2022
82022
Poster: Fingerprinting hidden service circuits from a tor middle relay
M Juarez, T Elahi, R Jansen, C Diaz, R Galvez, M Wright
Proceedings of IEEE S&P, 2017
42017
Privacy Preserving Detection of Path Bias Attacks in Tor.
L Watson, A Mediratta, T Elahi, R Sarkar
Proceedings on Privacy Enhancing Technologies 2020 (4), 111-130, 2020
22020
Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering.
X Ma, F Rochet, T Elahi
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
12022
Building A privacy testbed: Use cases and design considerations
J Gardiner, P Das Chowdhury, J Halsey, M Tahaei, T Elahi, A Rashid
European Symposium on Research in Computer Security, 185-193, 2021
12021
Privacy assurance checking
S Pearson, T Elahi
Digital Privacy: PRIME-Privacy and Identity Management for Europe, 427-456, 2011
12011
Connecting the Dots in the Sky: Website Fingerprinting in Low Earth Orbit Satellite Internet
P Singh, D Barradas, T Elahi, N Limam
Workshop on the Security of Space and Satellite Systems, 2024
2024
Accelerated Shapley Value Approximation for Data Evaluation
L Watson, Z Kujawa, R Andreeva, HT Yang, T Elahi, R Sarkar
arXiv preprint arXiv:2311.05346, 2023
2023
VeraSel: Verifiable Random Selection for Mixnets Construction
X Ma, F Rochet, T Elahi
arXiv preprint arXiv:2301.09207, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–19