Author of the publication

20, 000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables.

, , , , and . Proc. Priv. Enhancing Technol., 2015 (1): 4-24 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

kNN-based adaptive virtual reality game system., , and . ICNSC, page 457-462. IEEE, (2014)FlashFlow: A Secure Speed Test for Tor., , and . CoRR, (2020)Balancing Fun and Learning in a Serious Game Design., , , and . Int. J. Game Based Learn., 4 (4): 37-57 (2014)Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection., , , , and . NDSS, The Internet Society, (2017)Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management., , , , , , and . LISA, page 33-46. USENIX, (2004)FlashFlow: A Secure Speed Test for Tor., , and . ICDCS, page 381-391. IEEE, (2021)Understanding Tor Usage with Privacy-Preserving Measurement., , , , and . Internet Measurement Conference, page 175-187. ACM, (2018)Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests., , , , , and . ICAC, page 106-113. IEEE Computer Society, (2004)Visualizing and Predicting Culex Tarsalis Trapcounts for West Nile Virus (WNV) Disease Incidence using Machine Learning Models., , , , , , , , , and . EIT, page 581-587. IEEE, (2020)Probabilistic analysis of onion routing in a black-box model., , and . WPES, page 1-10. ACM, (2007)