Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Agentenorientierte OP-Plannung, , and . Informatik Tage 2003, Bad Schussenried, Germany, (November 2003)The state of affairs in BGP security: A survey of attacks and defenses., , and . Comput. Commun., (2018)Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications., , , and . NCA, page 1-6. IEEE, (2020)On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds.. Q2SWinet@MSWiM, page 35-42. ACM, (2015)WhisperChord: Scalable and Secure Node Discovery for Overlay Networks., , and . LCN, page 170-177. IEEE, (2021)Path Selection Metrics for Performance-Improved Onion Routing., and . SAINT, page 114-120. IEEE Computer Society, (2009)Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments., , , , , and . ICNP, page 1-12. IEEE, (2019)Numerical Analysis and Optimisation of Class Based Queueing., and . ESM, page 543-547. SCS Europe, (2002)Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond., , , , , , and . ICISSP, page 583-591. SciTePress, (2023)GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks., , , and . SecureComm (1), volume 398 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 123-143. Springer, (2021)