From post

PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks.

, и . ACM Conference on Computer and Communications Security, стр. 349-360. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance and Security Improvements for Tor: A Survey., и . ACM Comput. Surv., 49 (2): 32:1-32:36 (2016)Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion)., и . Security Protocols Workshop, том 11286 из Lecture Notes in Computer Science, стр. 295-303. Springer, (2018)Outsourced private information retrieval., и . WPES, стр. 119-130. ACM, (2013)Plinko: polling with a physical implementation of a noisy channel., , и . WPES, стр. 109-112. ACM, (2009)Some Results on the Existence of t-All-or-Nothing Transforms Over Arbitrary Alphabets., , и . IEEE Trans. Inf. Theory, 64 (4): 3136-3143 (2018)Privacy Enhancing Technologies for the Internet III: Ten Years Later. Digital Privacy: Theory, Technologies and Practices, стр. 3--18. New York, London, Auerbach Publications, (2007)Mitigator: Privacy policy compliance using trusted hardware., и . Proc. Priv. Enhancing Technol., 2020 (3): 204-221 (2020)SoK: Privacy-Preserving Reputation Systems., и . Proc. Priv. Enhancing Technol., 2021 (1): 107-127 (2021)Privacy Pass: Bypassing Internet Challenges Anonymously., , , , и . Proc. Priv. Enhancing Technol., 2018 (3): 164-180 (2018)Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement., и . ACM Conference on Computer and Communications Security, стр. 1702-1714. ACM, (2016)