Author of the publication

Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?

, , , and . USENIX Security Symposium, USENIX Association, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tick Tock: Building Browser Red Pills from Timing Side Channels., , , and . WOOT, USENIX Association, (2014)Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?, , , and . USENIX Security Symposium, USENIX Association, (2007)CAMP: Content-Agnostic Malware Protection., , , , and . NDSS, The Internet Society, (2013)Forgery Quality and Its Implications for Behavioral Biometric Security., , and . IEEE Trans. Syst. Man Cybern. Part B, 37 (5): 1107-1118 (2007)Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations., , , , and . SP, page 35-49. IEEE Computer Society, (2008)Correlation-Resistant Storage via Keyword-Searchable Encryption., , , and . IACR Cryptology ePrint Archive, (2005)The Practical Subtleties of Biometric Key Generation., , and . USENIX Security Symposium, page 61-74. USENIX Association, (2008)Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension., , , , , , , and . WWW, page 1009-1019. ACM, (2016)Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing., , and . USENIX Security Symposium, USENIX Association, (2006)Towards practical biometric key generation with randomized biometric templates., , , and . ACM Conference on Computer and Communications Security, page 235-244. ACM, (2008)