Author of the publication

Analyzing the Gold Star Scheme in a Split Tor Network.

, , and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-95. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic Protocol Analysis of AN.ON., , , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 114-128. Springer, (2010)Security Analysis of AN.ON's Payment Scheme.. NordSec, volume 5838 of Lecture Notes in Computer Science, page 255-270. Springer, (2009)A Kademlia-Based Node Lookup System for Anonymization Networks., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 179-189. Springer, (2009)Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection., and . Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, page 62-76. Springer, (2011)Introducing Perfect Forward Secrecy for AN.ON., and . EUNICE, volume 6164 of Lecture Notes in Computer Science, page 132-142. Springer, (2010)Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates., , and . ICT Innovations, volume 83 of Communications in Computer and Information Science, page 102-113. (2010)SHALON: Lightweight Anonymization Based on Open Standards., , , and . ICCCN, page 1-7. IEEE Computer Society, (2009)Ein einfaches Anonymisierungsverfahren basierend auf offenen Standards.. Informatiktage, volume S-6 of LNI, page 231-233. GI, (2008)Analyzing the Gold Star Scheme in a Split Tor Network., , and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-95. Springer, (2011)