Author of the publication

Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes.

, , , , , and . WWW (Companion Volume), page 678-681. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Lightweight Main Memory Database for Telecom Network Performance Management System., , and . J. Networks, 7 (4): 667-674 (2012)Scalable Blind Matching: An Efficient Ciphertext Matching Scheme for Content-Based Pub/Sub Cloud Services., , , , and . IEEE BigData, page 5668-5670. IEEE, (2020)A Lightweight Time Series Main-Memory Database for IoT Real-Time Services., , , , and . IOV, volume 11894 of Lecture Notes in Computer Science, page 220-236. Springer, (2019)An efficient confidentiality protection solution for pub/sub system., , , , , , , and . Cybersecur., 6 (1): 34 (December 2023)On the Large-Scale Traffic DDoS Threat of Space Backbone Network., , , and . BigDataSecurity/HPSC/IDS, page 192-194. IEEE, (2019)An Identity Alignment Method based on Online Tracking., , , , , , , , and . WWW (Companion Volume), page 609-612. ACM, (2024)Summary Instance: Scalable Event Priority Determination Engine for Large-Scale Distributed Event-Based System., , , , and . IJDSN, (2015)A Universal Complex Event Processing Mechanism Based on Edge Computing for Internet of Things Real-Time Monitoring., , , , and . IEEE Access, (2019)An Event-Driven Service-Oriented Architecture for the Internet of Things., , , , and . APSCC, page 68-73. IEEE Computer Society, (2014)Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes., , , , , and . WWW (Companion Volume), page 678-681. ACM, (2024)