Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Speed Matching of Vulnerability Signatures., , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 155-174. Springer, (2008)Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach., , , and . KSII Trans. Internet Inf. Syst., 4 (3): 380-399 (2010)PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption, and . CoRR, (2012)Non-blind watermarking of network flows, , and . CoRR, (2012)Improving multi-tier security using redundant authentication., , , , , and . CSAW, page 54-62. ACM, (2007)Information leaks in structured peer-to-peer anonymous communication systems., and . ACM Conference on Computer and Communications Security, page 267-278. ACM, (2008)In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems., , and . ACM Conference on Computer and Communications Security, page 308-318. ACM, (2010)Protecting location privacy against inference attacks., and . ACM Conference on Computer and Communications Security, page 711-713. ACM, (2010)Towards improving network flow watermarks using the repeat-accumulate codes., and . ICASSP, page 1852-1855. IEEE, (2011)Generic Application-Level Protocol Analyzer and its Language, , , and . #NDSS07#, (2007)