Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Censored Planet: An Internet-wide, Longitudinal Censorship Observatory., , , and . ACM Conference on Computer and Communications Security, page 49-66. ACM, (2020)Hope of Delivery: Extracting User Locations From Mobile Instant Messengers., , , and . CoRR, (2022)Breaking LTE on Layer Two., , , and . IEEE Symposium on Security and Privacy, page 1121-1136. IEEE, (2019)Hope of Delivery: Extracting User Locations From Mobile Instant Messengers., , , and . NDSS, The Internet Society, (2023)On the Challenges of Geographical Avoidance for Tor., , , , and . NDSS, The Internet Society, (2019)IMP4GT: IMPersonation Attacks in 4G NeTworks., , , and . NDSS, The Internet Society, (2020)VerLoc: Verifiable Localization in Decentralized Systems., and . USENIX Security Symposium, page 2637-2654. USENIX Association, (2022)Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor., , , , , and . Proc. Priv. Enhancing Technol., 2022 (3): 314-335 (2022)Lost traffic encryption: fingerprinting LTE/4G traffic on layer two., , , and . WiSec, page 249-260. ACM, (2019)Preliminary Analysis of Potential Harms in the Luca Tracing System., , , and . CoRR, (2021)