Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis., , and . NDSS, The Internet Society, (2009)Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces., , , , and . NDSS, The Internet Society, (2007)Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail., , , and . IEEE Symposium on Security and Privacy, page 332-346. IEEE Computer Society, (2012)Understanding Domain Registration Abuses., , , , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 68-79. Springer, (2010)Access controls for oblivious and anonymous systems., , and . ACM Trans. Inf. Syst. Secur., 14 (1): 10:1-10:28 (2011)On the development of an internetwork-centric defense for scanning worms., and . Computers & Security, 28 (7): 637-647 (2009)Format-Transforming Encryption: More than Meets the DPI., , , and . IACR Cryptology ePrint Archive, (2012)Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification., and . IEEE Symposium on Security and Privacy Workshops, page 21-27. IEEE, (2019)Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations., , , , and . IEEE Symposium on Security and Privacy, page 35-49. IEEE Computer Society, (2008)Taming the Devil: Techniques for Evaluating Anonymized Network Data., , , , and . NDSS, The Internet Society, (2008)