Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-blind watermarking of network flows, , and . CoRR, (2012)PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption, and . CoRR, (2012)Information leaks in structured peer-to-peer anonymous communication systems., and . ACM Conference on Computer and Communications Security, page 267-278. ACM, (2008)Improving multi-tier security using redundant authentication., , , , , and . CSAW, page 54-62. ACM, (2007)In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems., , and . ACM Conference on Computer and Communications Security, page 308-318. ACM, (2010)Protecting location privacy against inference attacks., and . ACM Conference on Computer and Communications Security, page 711-713. ACM, (2010)Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach., , , and . KSII Trans. Internet Inf. Syst., 4 (3): 380-399 (2010)Generic Application-Level Protocol Analyzer and its Language, , , and . #NDSS07#, (2007)Towards improving network flow watermarks using the repeat-accumulate codes., and . ICASSP, page 1852-1855. IEEE, (2011)High-Speed Matching of Vulnerability Signatures., , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 155-174. Springer, (2008)