Author of the publication

In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.

, , and . ACM Conference on Computer and Communications Security, page 308-318. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems., and . ACM Trans. Inf. Syst. Secur., 15 (1): 5:1-5:28 (2012)PinMe: Tracking a Smartphone User around the World., , , and . CoRR, (2018)Systematic Evaluation of Privacy Risks of Machine Learning Models., and . CoRR, (2020)RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release., , and . Proc. Priv. Enhancing Technol., 2019 (1): 26-46 (2019)ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies., and . ACM Conference on Computer and Communications Security, page 161-172. ACM, (2009)Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To!, , , , , , and . CoRR, (2023)A Light Recipe to Train Robust Vision Transformers., , and . CoRR, (2022)A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence., , , , , , , , , and . ICDE, page 2705-2708. IEEE, (2021)SSD: A Unified Framework for Self-Supervised Outlier Detection., , and . ICLR, OpenReview.net, (2021)Effectively Using Public Data in Privacy Preserving Machine Learning., , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 25718-25732. PMLR, (2023)