Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Agentenorientierte OP-Plannung, , and . Informatik Tage 2003, Bad Schussenried, Germany, (November 2003)WhisperChord: Scalable and Secure Node Discovery for Overlay Networks., , and . LCN, page 170-177. IEEE, (2021)Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments., , , , , and . ICNP, page 1-12. IEEE, (2019)Path Selection Metrics for Performance-Improved Onion Routing., and . SAINT, page 114-120. IEEE Computer Society, (2009)On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds.. Q2SWinet@MSWiM, page 35-42. ACM, (2015)Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications., , , and . NCA, page 1-6. IEEE, (2020)Numerical Analysis and Optimisation of Class Based Queueing., and . ESM, page 543-547. SCS Europe, (2002)Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research., , , , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 379-397. Springer, (2022)Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing., , , , , , , , and . ICNP, page 1-2. IEEE, (2019)GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks., , , and . SecureComm (1), volume 398 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 123-143. Springer, (2021)