Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A better zip bomb.. WOOT @ USENIX Security Symposium, USENIX Association, (2019)Examining How the Great Firewall Discovers Hidden Circumvention Servers., , , , , and . Internet Measurement Conference, page 445-458. ACM, (2015)Fingerprinting Web Users Through Font Metrics., and . Financial Cryptography, volume 8975 of Lecture Notes in Computer Science, page 107-124. Springer, (2015)Blocking-resistant communication through domain fronting., , , , and . Proc. Priv. Enhancing Technol., 2015 (2): 46-64 (2015)Censors' Delay in Blocking Circumvention Proxies., and . FOCI, USENIX Association, (2016)Unsupervised authorship attribution., , and . CoRR, (2015)Remote Operating System Classification over IPv6., , , , and . AISec@CCS, page 57-67. ACM, (2015)Turbo Tunnel, a good way to design censorship circumvention protocols.. FOCI @ USENIX Security Symposium, USENIX Association, (2020)Evading Censorship with Browser-Based Proxies., , , , , , and . Privacy Enhancing Technologies, volume 7384 of Lecture Notes in Computer Science, page 239-258. Springer, (2012)Detecting Censor Detection., , and . CoRR, (2017)