Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption., , , , , , , and . NDSS, The Internet Society, (2019)Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces., , , , and . NDSS, The Internet Society, (2007)The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption., and . ACM Conference on Computer and Communications Security, page 1341-1352. ACM, (2016)The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage., , and . DSN, page 517-529. IEEE, (2019)Inference Attacks on Property-Preserving Encrypted Databases., , and . CCS, page 644-655. ACM, (2015)Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations., , , , and . SP, page 35-49. IEEE Computer Society, (2008)Taming the Devil: Techniques for Evaluating Anonymized Network Data., , , , and . NDSS, The Internet Society, (2008)HMM profiles for network traffic classification., , and . VizSEC, page 9-15. ACM, (2004)Using visual motifs to classify encrypted traffic., , and . VizSEC, page 41-50. ACM, (2006)Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security., , , , , and . RAID, volume 6307 of Lecture Notes in Computer Science, page 218-237. Springer, (2010)