Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zero false positive 2-secure fingerprinting watermarking based on combining hamming distance conditions and parent pair search., , , and . MM&Sec, page 169-174. ACM, (2010)Detection and Analysis of Tor Onion Services., , , and . J. Cyber Secur. Mobil., 9 (1): 141-174 (2020)Performance and code length optimization of joint decoding tardos fingerprinting., and . MM&Sec, page 27-32. ACM, (2012)Critical Traffic Analysis on the Tor Network., , and . J. Cyber Secur. Mobil., 10 (1): 133-160 (2021)Collusion-Secure Fingerprint Watermarking for Real World Applications., , , , , and . Sicherheit, volume P-170 of LNI, page 129-140. GI, (2010)Detection and Analysis of Tor Onion Services., , , , and . ARES, page 66:1-66:10. ACM, (2019)Leakage detection and tracing for databases., , and . IH&MMSec, page 29-34. ACM, (2013)Enhancing development and consistency of UML models and model executions with USE studio., and . MoDELS (Companion), page 14:1-14:5. ACM, (2020)Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models., , , and . IH&MMSec, page 109-114. ACM, (2015)Critical traffic analysis on the tor network., , and . ARES, page 77:1-77:10. ACM, (2020)