Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Your Neighbors Are My Spies: Location and other Privacy Concerns in Dating Apps., , and . CoRR, (2016)Your Neighbors Are My Spies: Location and other Privacy Concerns in GLBT-focused Location-based Dating Applications., , and . CoRR, (2016)An Empirical Study of the I2P Anonymity Network and its Censorship Resistance., , , and . Internet Measurement Conference, page 379-392. ACM, (2018)ICLab: A Global, Longitudinal Internet Censorship Measurement Platform., , , , , , and . CoRR, (2019)Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network.. CoRR, (2016)Assessing the Privacy Benefits of Domain Name Encryption., , , , and . CoRR, (2019)The web is still small after more than a decade., , , and . Comput. Commun. Rev., 50 (2): 24-31 (2020)Measuring I2P Censorship at a Global Scale., , and . FOCI @ USENIX Security Symposium, USENIX Association, (2019)How Great is the Great Firewall? Measuring China's DNS Censorship., , , , , , , , and . USENIX Security Symposium, page 3381-3398. USENIX Association, (2021)Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering., , and . PAM, volume 13210 of Lecture Notes in Computer Science, page 518-536. Springer, (2022)