Author of the publication

On the Privacy and Performance of Mobile Anonymous Microblogging.

, , , , , and . IEEE Trans. Information Forensics and Security, 11 (7): 1578-1591 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Side Channels in the McEliece PKC., , , , and . PQCrypto, volume 5299 of Lecture Notes in Computer Science, page 216-229. Springer, (2008)DECT Security Analysis.. IACR Cryptology ePrint Archive, (2012)Security analysis of a widely deployed locking system., , , , and . ACM Conference on Computer and Communications Security, page 929-940. ACM, (2013)Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures., , , and . Sicherheit, volume P-128 of LNI, page 97-109. GI, (2008)On the Privacy and Performance of Mobile Anonymous Microblogging., , , , , and . IEEE Trans. Information Forensics and Security, 11 (7): 1578-1591 (2016)Kann man mit DECT noch vertraulich telefonieren?, and . Datenschutz und Datensicherheit, 34 (11): 758-760 (2010)Breaking DVB-CSA., , and . WEWoRC, volume 7242 of Lecture Notes in Computer Science, page 45-61. Springer, (2011)IT-Security in Railway Signalling Systems., , and . ISSE, page 56-64. Springer, (2014)Security of Invertible Media Authentication Schemes Revisited., , , , , , , , , and 2 other author(s). Information Hiding, volume 4567 of Lecture Notes in Computer Science, page 189-203. Springer, (2007)Practical attacks against WEP and WPA., and . WISEC, page 79-86. ACM, (2009)