Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Evil Twin Attacks in 802.11., , and . IPCCC, page 513-516. IEEE Computer Society, (2008)Methodically Modeling the Tor Network., , , and . CSET, USENIX Association, (2012)Changing of the guards: a framework for understanding and improving entry guard selection in tor., , , , and . WPES, page 43-54. ACM, (2012)SniffMob: inferring human contact patterns using wireless devices., , , , , and . HotPlanet@MobiSys, page 4. ACM, (2009)Physical Layer Attacks on Unlinkability in Wireless LANs., , , , and . Privacy Enhancing Technologies, volume 5672 of Lecture Notes in Computer Science, page 108-127. Springer, (2009)The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can., , , , , , and . GLOBECOM, page 1-6. IEEE, (2009)Enhancing Tor's performance using real-time traffic classification., , and . CCS, page 73-84. ACM, (2012)DefenestraTor: Throwing Out Windows in Tor., , , , , , and . PETS, volume 6794 of Lecture Notes in Computer Science, page 134-154. Springer, (2011)Performing traffic analysis on a wireless identifier-free link layer., , , , and . Richard Tapia Celebration of Diversity in Computing Conference, page 18-23. ACM, (2009)Predicting Tor path compromise by exit port., , and . IPCCC, page 384-387. IEEE Computer Society, (2009)