From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

From Weak to Strong Watermarking., , и . TCC, том 4392 из Lecture Notes in Computer Science, стр. 362-382. Springer, (2007)The Cost of the Path Not Taken., , , и . GLOBECOM, стр. 1-6. IEEE, (2016)How Low Can You Go: Balancing Performance with Anonymity in Tor., , и . Privacy Enhancing Technologies, том 7981 из Lecture Notes in Computer Science, стр. 164-184. Springer, (2013)BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper)., и . Financial Cryptography, том 7035 из Lecture Notes in Computer Science, стр. 268-275. Springer, (2011)Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR., , и . Proc. Priv. Enhancing Technol., 2018 (3): 181-202 (2018)PeerFlow: Secure Load Balancing in Tor., , , , и . Proc. Priv. Enhancing Technol., 2017 (2): 74-94 (2017)GANDaLF: GAN for Data-Limited Fingerprinting., , , , и . Proc. Priv. Enhancing Technol., 2021 (2): 305-322 (2021)rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation., , , и . NDSS, The Internet Society, (2013)Scalable onion routing with torsk., , , и . CCS, стр. 590-599. ACM, (2009)Hashing it out in public: common failure modes of DHT-based anonymity schemes., , и . WPES, стр. 71-80. ACM, (2009)