Author of the publication

POSTER: Fingerprinting Tor Hidden Services.

, , , , , and . ACM Conference on Computer and Communications Security, page 1766-1768. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Agentenorientierte OP-Plannung, , and . Informatik Tage 2003, Bad Schussenried, Germany, (November 2003)The state of affairs in BGP security: A survey of attacks and defenses., , and . Comput. Commun., (2018)Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications., , , and . NCA, page 1-6. IEEE, (2020)On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds.. Q2SWinet@MSWiM, page 35-42. ACM, (2015)Path Selection Metrics for Performance-Improved Onion Routing., and . SAINT, page 114-120. IEEE Computer Society, (2009)Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments., , , , , and . ICNP, page 1-12. IEEE, (2019)WhisperChord: Scalable and Secure Node Discovery for Overlay Networks., , and . LCN, page 170-177. IEEE, (2021)Numerical Analysis and Optimisation of Class Based Queueing., and . ESM, page 543-547. SCS Europe, (2002)Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond., , , , , , and . ICISSP, page 583-591. SciTePress, (2023)Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing., , , , , , , , and . ICNP, page 1-2. IEEE, (2019)