From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the effectiveness of k;-anonymity against traffic analysis and surveillance., и . WPES, стр. 9-18. ACM, (2006)On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design., и . WPES, стр. 31-40. ACM, (2009)p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning., , и . Proc. Priv. Enhancing Technol., 2019 (3): 191-209 (2019)Location leaks over the GSM air interface., , , и . NDSS, The Internet Society, (2012)Shadow: Running Tor in a Box for Accurate and Efficient Experimentation., и . NDSS, The Internet Society, (2012)Losing Control of the Internet: Using the Data Plane to Attack the Control Plane., , , , , и . NDSS, The Internet Society, (2011)Accurate and Provably Secure Latency Estimation with Treeple., и . NDSS, The Internet Society, (2011)MP3: A More Efficient Private Presence Protocol., , и . Financial Cryptography, том 10957 из Lecture Notes in Computer Science, стр. 38-57. Springer, (2018)BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper)., и . Financial Cryptography, том 7035 из Lecture Notes in Computer Science, стр. 268-275. Springer, (2011)How Low Can You Go: Balancing Performance with Anonymity in Tor., , и . Privacy Enhancing Technologies, том 7981 из Lecture Notes in Computer Science, стр. 164-184. Springer, (2013)