From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

FlyByNight: mitigating the privacy risks of social networking., и . WPES, стр. 1-8. ACM, (2008)Cachet: a decentralized architecture for privacy preserving social networking with caching., , , , и . CoNEXT, стр. 337-348. ACM, (2012)Multiplicative Differentials., , , и . FSE, том 2365 из Lecture Notes in Computer Science, стр. 17-33. Springer, (2002)BotMosaic: Collaborative Network Watermark for Botnet Detection, и . CoRR, (2012)Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures, , и . CoRR, (2012)Safety in discretionary access control for logic-based publish-subscribe systems., , и . SACMAT, стр. 3-12. ACM, (2009)Securing Anonymous Communication Channels under the Selective DoS Attack., и . Financial Cryptography, том 7859 из Lecture Notes in Computer Science, стр. 362-370. Springer, (2013)MLEFlow: Learning from History to Improve Load Balancing in Tor., , , , , и . Proc. Priv. Enhancing Technol., 2022 (1): 75-104 (2022)Improving Security and Performance in the Tor Network through Tunable Path Selection., и . IEEE Trans. Dependable Secur. Comput., 8 (5): 728-741 (2011)Differentially Private Data Generative Models., , , , , , и . CoRR, (2018)