Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing Latency and Excess Data Dissemination in Fog-Based Publish/Subscribe Systems., , , and . ICFC, page 9-16. IEEE, (2020)Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks., and . AFT, page 214-227. ACM, (2020)BBBlockchain: Blockchain-Based Participation in Urban Development., , , and . eScience, page 321-330. IEEE, (2019)Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges., , , and . ACM Trans. Internet Techn., 22 (4): 97:1-97:30 (November 2022)Unleashing Tor, BitTorrent & Co.: How to relieve TCP deficiencies in overlays., , and . LCN, page 320-323. IEEE Computer Society, (2010)Empirical Analysis of On-chain Voting with Smart Contracts., and . Financial Cryptography Workshops, volume 12676 of Lecture Notes in Computer Science, page 397-412. Springer, (2021)On the Impact of Attachment Strategies for Payment Channel Networks., , and . IEEE ICBC, page 1-9. IEEE, (2021)Towards mobility reports with user-level privacy., , , and . J. Locat. Based Serv., 17 (2): 95-121 (January 2023)Quantifying the Re-identification Risk of Event Logs for Process Mining., , , , , , , and . CoRR, (2020)Towards Verifiable Mutability for Blockchains., and . CoRR, (2021)