Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing Latency and Excess Data Dissemination in Fog-Based Publish/Subscribe Systems., , , and . ICFC, page 9-16. IEEE, (2020)BBBlockchain: Blockchain-Based Participation in Urban Development., , , and . eScience, page 321-330. IEEE, (2019)Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks., and . AFT, page 214-227. ACM, (2020)On the Impact of Attachment Strategies for Payment Channel Networks., , and . IEEE ICBC, page 1-9. IEEE, (2021)Empirical Analysis of On-chain Voting with Smart Contracts., and . Financial Cryptography Workshops, volume 12676 of Lecture Notes in Computer Science, page 397-412. Springer, (2021)Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges., , , and . ACM Trans. Internet Techn., 22 (4): 97:1-97:30 (November 2022)Unleashing Tor, BitTorrent & Co.: How to relieve TCP deficiencies in overlays., , and . LCN, page 320-323. IEEE Computer Society, (2010)Webchain: Verifiable Citations and References for the World Wide Web., , and . iThings/GreenCom/CPSCom/SmartData, page 1367-1372. IEEE, (2018)Towards mobility reports with user-level privacy., , , and . J. Locat. Based Serv., 17 (2): 95-121 (January 2023)Erratum zu: Tor Relays an Universitäten., , , and . Datenschutz und Datensicherheit, 45 (12): 849 (2021)