Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HMM profiles for network traffic classification., , and . VizSEC, page 9-15. ACM, (2004)Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security., , , , , and . RAID, volume 6307 of Lecture Notes in Computer Science, page 218-237. Springer, (2010)Using visual motifs to classify encrypted traffic., , and . VizSEC, page 41-50. ACM, (2006)Uncovering Spoken Phrases in Encrypted Voice over IP Conversations., , , , and . ACM Trans. Inf. Syst. Secur., 13 (4): 35:1-35:30 (2010)Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces., , , , and . NDSS, The Internet Society, (2007)The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption., and . ACM Conference on Computer and Communications Security, page 1341-1352. ACM, (2016)Inference Attacks on Property-Preserving Encrypted Databases., , and . ACM Conference on Computer and Communications Security, page 644-655. ACM, (2015)The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage., , and . DSN, page 517-529. IEEE, (2019)Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption., , , , , , , and . NDSS, The Internet Society, (2019)Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations., , , , and . IEEE Symposium on Security and Privacy, page 35-49. IEEE Computer Society, (2008)