Short Paper: The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms

Marcella Hastings , Nadia Heninger , Eric Wustrow
Financial Cryptography and Data Security: 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers 23 396 -404

8
2019
Widespread Weak Keys in Network Devices

Nadia Heninger , Zakir Durumeric , Eric Wustrow , J Alex Halderman

3
2012
Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Translation

Mizhang Streisand , Eric Wustrow , Amir Houmansadr
Free and Open Communications on the Internet

2023
You Can't See Me: Providing Privacy in Vision Pipelines via Wi-Fi Localization

Shazal Irshad , Ria Thakkar , Eric Rozner , Eric Wustrow
2023 IEEE 29th International Symposium on Local and Metropolitan Area Networks (LANMAN) 1 -6

2023
Oscur0: One-Shot Circumvention without Registration

Mingye Chen , Jack Wampler , Abdulrahman Alaraj , Gaukas Wang
Free and Open Communications on the Internet

2024
{HTTPT}: A {Probe-Resistant} Proxy

Sergey Frolov , Eric Wustrow
10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)

10
2020
Chasing Shadows: A security analysis of the ShadowTLS proxy

Gaukas Wang , Jackson Sippe , Hai Chi , Eric Wustrow
Free and Open Communications on the Internet

3
2023
Security Hazards when Law is Code

Eric Wustrow
University of Michigan

1
2016
Verifying Indistinguishability of Privacy-Preserving Protocols

Kirby Linvill , Gowtham Kaki , Eric Wustrow
Proceedings of the ACM on Programming Languages 7 ( OOPSLA2) 1442 -1469

2023
Censorship Resistance

Eric Wustrow