From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Forensic investigation of the OneSwarm anonymous filesharing system., , и . ACM Conference on Computer and Communications Security, стр. 201-214. ACM, (2011)Statistical Detection of Downloaders in Freenet., , , и . IWPE@SP, том 1873 из CEUR Workshop Proceedings, стр. 25-32. CEUR-WS.org, (2017)Maximizing transfer opportunities in bluetooth DTNs., , и . CoNEXT, стр. 3. ACM, (2006)Strengthening forensic investigations of child pornography on P2P networks., , и . CoNEXT, стр. 19. ACM, (2010)Sybil-Resistant Mixing for Bitcoin., , , и . WPES, стр. 149-158. ACM, (2014)Detecting Denial of Service Attacks in Tor., , и . Financial Cryptography, том 5628 из Lecture Notes in Computer Science, стр. 273-284. Springer, (2009)Cheat-proof playout for centralized and peer-to-peer gaming., , и . IEEE/ACM Trans. Netw., 15 (1): 1-13 (2007)Effective Digital Forensics Research Is Investigator-Centric., , , и . HotSec, USENIX Association, (2011)Discovering specification violations in networked software systems., , , и . ISSRE, стр. 496-506. IEEE Computer Society, (2015)Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet., , , , и . Privacy Enhancing Technologies, том 7981 из Lecture Notes in Computer Science, стр. 103-122. Springer, (2013)