default search action
Devashish Gosain
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Devashish Gosain, Kartikey Singh, Rishi Sharma, Jithin Suresh Babu, Sambuddho Chakravarty:
Out in the Open: On the Implementation of Mobile App Filtering in India. PAM (2) 2024: 19-36 - 2023
- [c17]Sahil Gupta, Devashish Gosain, Minseok Kwon, Hrishikesh B. Acharya:
Predictable Internet Clients and In-Switch Deep Packet Inspection. ICCCN 2023: 1-10 - [c16]Ali Rasaii, Devashish Gosain, Oliver Gasser:
Thou Shalt Not Reject: Analyzing Accept-Or-Pay Cookie Banners on the Web. IMC 2023: 154-161 - [c15]Zeya Umayya, Dhruv Malik, Devashish Gosain, Piyush Kumar Sharma:
PTPerf: On the Performance Evaluation of Tor Pluggable Transports. IMC 2023: 501-525 - [c14]Sahil Gupta, Devashish Gosain, Minseok Kwon, Hrishikesh B. Acharya:
DeeP4R: Deep Packet Inspection in P4 using Packet Recirculation. INFOCOM 2023: 1-10 - [c13]Piyush Kumar Sharma, Devashish Gosain, Claudia Díaz:
On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies. NDSS 2023 - [c12]Ali Rasaii, Shivani Singh, Devashish Gosain, Oliver Gasser:
Exploring the Cookieverse: A Multi-Perspective Analysis of Web Cookies. PAM 2023: 623-651 - [c11]Tarun Kumar Yadav, Devashish Gosain, Kent E. Seamons:
Cryptographic Deniability: A Multi-perspective Study of User Perceptions and Expectations. USENIX Security Symposium 2023: 3637-3654 - [i10]Ali Rasaii, Shivani Singh, Devashish Gosain, Oliver Gasser:
Exploring the Cookieverse: A Multi-Perspective Analysis of Web Cookies. CoRR abs/2302.05353 (2023) - [i9]Zeya Umayya, Dhruv Malik, Devashish Gosain, Piyush Kumar Sharma:
PTPerf: On the performance evaluation of Tor Pluggable Transports. CoRR abs/2309.14856 (2023) - [i8]Ali Rasaii, Devashish Gosain, Oliver Gasser:
Thou Shalt Not Reject: Analyzing Accept-Or-Pay Cookie Banners on the Web. CoRR abs/2310.01108 (2023) - 2022
- [c10]Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons:
Automatic Detection of Fake Key Attacks in Secure Messaging. CCS 2022: 3019-3032 - [i7]Piyush Kumar Sharma, Devashish Gosain, Claudia Díaz:
On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies. CoRR abs/2201.11860 (2022) - [i6]Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons:
Automatic Detection of Fake Key Attacks in Secure Messaging. CoRR abs/2210.09940 (2022) - 2021
- [j5]Devashish Gosain, Mayank Mohindra, Sambuddho Chakravarty:
Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs. Proc. Priv. Enhancing Technol. 2021(2): 173-193 (2021) - [c9]Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty:
Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels. AsiaCCS 2021: 147-161 - [c8]Sahil Gupta, Devashish Gosain, Garegin Grigoryan, Minseok Kwon, Hrishikesh B. Acharya:
Demo: Simple Deep Packet Inspection with P4. ICNP 2021: 1-2 - [c7]Devashish Gosain, Aishwarya Jaiswal, Hrishikesh B. Acharya, Sambuddho Chakravarty:
Telemetron: Measuring Network Capacity Between Off-Path Remote Hosts. LCN 2021: 351-354 - [c6]Iness Ben Guirat, Devashish Gosain, Claudia Díaz:
MiXiM: Mixnet Design Decisions and Empirical Evaluation. WPES@CCS 2021: 33-37 - 2020
- [j4]Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, Hrishikesh B. Acharya, Sambuddho Chakravarty:
SiegeBreaker: An SDN Based Practical Decoy Routing System. Proc. Priv. Enhancing Technol. 2020(3): 243-263 (2020) - [c5]Devashish Gosain, Madhur Rawat, Piyush Kumar Sharma, Hrishikesh B. Acharya:
Maginot Lines and Tourniquets: On the Defendability of National Cyberspace. LCN Symposium 2020: 19-30
2010 – 2019
- 2019
- [j3]Mohit Sajwan, Devashish Gosain, Ajay K. Sharma:
CAMP: cluster aided multi-path routing protocol for wireless sensor networks. Wirel. Networks 25(5): 2603-2620 (2019) - 2018
- [j2]Mohit Sajwan, Devashish Gosain, Ajay K. Sharma:
Hybrid energy-efficient multi-path routing for wireless sensor networks. Comput. Electr. Eng. 67: 96-113 (2018) - [c4]Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty:
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. Internet Measurement Conference 2018: 252-264 - [i5]Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, Hrishikesh B. Acharya, Sambuddho Chakravarty:
Mending Wall: On the Implementation of Censorship in India. CoRR abs/1806.06518 (2018) - [i4]Hrishikesh B. Acharya, Sambuddho Chakravarty, Devashish Gosain:
Few Throats to Choke: On the Current Structure of the Internet. CoRR abs/1806.07038 (2018) - [i3]Devashish Gosain, Soubhik Chakraborty, Mohit Sajwan:
Simulating Raga Notes with a Markov Chain of Order 1-2. CoRR abs/1808.01603 (2018) - [i2]Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty:
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. CoRR abs/1808.01708 (2018) - 2017
- [j1]Devashish Gosain, Itu Snigdh, Mohit Sajwan:
DSERR: Delay Sensitive Energy Efficient Reliable Routing Algorithm. Wirel. Pers. Commun. 97(3): 3685-3704 (2017) - [c3]Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya:
The Devil's in The Details: Placing Decoy Routers in the Internet. ACSAC 2017: 577-589 - [c2]Hrishikesh B. Acharya, Sambuddho Chakravarty, Devashish Gosain:
Few Throats to Choke: On the Current Structure of the Internet. LCN 2017: 339-346 - [c1]Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, Hrishikesh B. Acharya, Sambuddho Chakravarty:
Mending Wall: On the Implementation of Censorship in India. SecureComm 2017: 418-437 - [i1]Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya:
The Devils in The Details: Placing Decoy Routers in the Internet. CoRR abs/1710.05527 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint