From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deniable Key Exchanges for Secure Messaging., и . ACM Conference on Computer and Communications Security, стр. 1211-1223. ACM, (2015)Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement., и . ACM Conference on Computer and Communications Security, стр. 1702-1714. ACM, (2016)An improved algorithm for tor circuit scheduling., и . ACM Conference on Computer and Communications Security, стр. 329-339. ACM, (2010)PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks., , и . ACM Conference on Computer and Communications Security, стр. 1068-1079. ACM, (2014)PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks., и . ACM Conference on Computer and Communications Security, стр. 349-360. ACM, (2013)Privacy Enhancing Technologies for the Internet III: Ten Years Later. Digital Privacy: Theory, Technologies and Practices, стр. 3--18. New York, London, Auerbach Publications, (2007)Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion)., и . Security Protocols Workshop, том 11286 из Lecture Notes in Computer Science, стр. 295-303. Springer, (2018)Outsourced private information retrieval., и . WPES, стр. 119-130. ACM, (2013)Plinko: polling with a physical implementation of a noisy channel., , и . WPES, стр. 109-112. ACM, (2009)Improved user authentication in off-the-record messaging., и . WPES, стр. 41-47. ACM, (2007)