Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The state of affairs in BGP security: A survey of attacks and defenses., , and . Comput. Commun., (2018)WhisperChord: Scalable and Secure Node Discovery for Overlay Networks., , and . LCN, page 170-177. IEEE, (2021)Security and performance implications of BGP rerouting-resistant guard selection algorithms for Tor., , and . Comput. Secur., (September 2023)POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages., , , , , , and . CCS, page 2411-2413. ACM, (2021)POSTER: Traffic Splitting to Counter Website Fingerprinting., , , , , , , and . CCS, page 2533-2535. ACM, (2019)Analysis of Multi-path Onion Routing-Based Anonymization Networks., , , , and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 240-258. Springer, (2019)TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting., , , , , , , , and . CCS, page 1971-1985. ACM, (2020)Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor., , , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 219-233. Springer, (2020)Mobile Adhoc Offloading., and . CoRR, (2014)GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks., , , and . SecureComm (1), volume 398 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 123-143. Springer, (2021)