Author of the publication

StegoTorus: a camouflage proxy for the Tor anonymity system.

, , , , , , and . ACM Conference on Computer and Communications Security, page 109-120. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Fast Revocation of Public Key Certificates and Security Capabilities., , , and . USENIX Security Symposium, USENIX, (2001)On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations., , , , and . FOCS, page 283-292. IEEE Computer Society, (2008)Privacy-Preserving Ridge Regression on Hundreds of Millions of Records., , , , , and . IEEE Symposium on Security and Privacy, page 334-348. IEEE Computer Society, (2013)Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser., , and . IEEE Security & Privacy, 14 (2): 22-28 (2016)Stronger Password Authentication Using Browser Extensions., , , , and . USENIX Security Symposium, USENIX Association, (2005)Recent ideas for circumventing internet filtering.. ACM Crossroads, 18 (2): 36-40 (2011)Reliable Location-Based Services from Radio Navigation Systems., , , and . Sensors, 10 (12): 11369-11389 (2010)IRON: Functional Encryption using Intel SGX., , , and . ACM Conference on Computer and Communications Security, page 765-782. ACM, (2017)Blum-Goldwasser Public Key Encryption System.. Encyclopedia of Cryptography and Security, Springer, (2005)Strong RSA Assumption.. Encyclopedia of Cryptography and Security, Springer, (2005)