Author of the publication

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android.

, , , and . WISEC, page 49-60. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Handling the NDEF signature record type in a secure manner., and . RFID-TA, page 107-112. IEEE, (2012)Side-Channel Analysis of Keymill., , , and . COSADE, volume 10348 of Lecture Notes in Computer Science, page 138-152. Springer, (2017)Leakage Bounds for Gaussian Side Channels., , , , , , and . CARDIS, volume 10728 of Lecture Notes in Computer Science, page 88-104. Springer, (2017)Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC., , , and . COSADE, volume 9064 of Lecture Notes in Computer Science, page 222-236. Springer, (2015)Investigation of Parameters Influencing the Success of Optical Fault Attacks.. FPS, volume 8352 of Lecture Notes in Computer Science, page 140-157. Springer, (2013)Location-Dependent EM Leakage of the ATxmega Microcontroller.. FPS, volume 8930 of Lecture Notes in Computer Science, page 17-32. Springer, (2014)Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes., , , , and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 369-395. (2016)Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order., , and . TIS@CCS, page 3. ACM, (2016)On the power of active relay attacks using custom-made proxies., and . IEEE RFID, page 126-133. IEEE, (2014)EM-based detection of hardware trojans on FPGAs., , , and . HOST, page 84-87. IEEE Computer Society, (2014)