Author of the publication

Low Latency Anonymity with Mix Rings.

, and . ISC, volume 4176 of Lecture Notes in Computer Science, page 32-45. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The case for crypto protocol awareness inside the OS kernel., and . SIGARCH Comput. Archit. News, 33 (1): 58-64 (2005)Analyzing Network Traffic with Chimera., , and . login Usenix Mag., (2013)Authentication on Untrusted Remote Hosts with Public-Key Sudo., , and . LISA, page 103-107. USENIX Association, (2008)Accelerating application-level security protocols., and . ICON, page 313-318. IEEE, (2003)Path-Based Access Control for Enterprise Networks., and . ISC, volume 5222 of Lecture Notes in Computer Science, page 191-203. Springer, (2008)Online Network Forensics for Automatic Repair Validation., , and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 136-151. Springer, (2008)F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services., and . ISC, volume 5735 of Lecture Notes in Computer Science, page 491-506. Springer, (2009)Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery., , and . LISA, page 1-13. USENIX Association, (2009)Cryptography as an operating system service: A case study., , , and . ACM Trans. Comput. Syst., 24 (1): 1-38 (2006)Low Latency Anonymity with Mix Rings., and . ISC, volume 4176 of Lecture Notes in Computer Science, page 32-45. Springer, (2006)