Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effect of DNS on Tor's Anonymity., , , , and . CoRR, (2016)The Great Firewall of China: How It Blocks Tor and Why It Is Hard to Pinpoint., and . ;login:, (2012)"Major Key Alert!" Anomalous Keys in Tor Relays., , , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 3-19. Springer, (2018)Identifying and characterizing Sybils in the Tor network., , , and . CoRR, (2016)Spoiled Onions: Exposing Malicious Tor Exit Relays., and . CoRR, (2014)Spoiled Onions: Exposing Malicious Tor Exit Relays., , , , , , and . Privacy Enhancing Technologies, volume 8555 of Lecture Notes in Computer Science, page 304-331. Springer, (2014)Examining How the Great Firewall Discovers Hidden Circumvention Servers., , , , , and . Internet Measurement Conference, page 445-458. ACM, (2015)Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector Machines., , and . NTMS, page 1-5. IEEE, (2011)Anomalieerkennung in Computernetzen., , , and . Datenschutz und Datensicherheit, 35 (4): 235-239 (2011)Towards a Censorship Analyser for Tor.. FOCI, USENIX Association, (2013)