Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Censor Detection., , and . CoRR, (2017)OSS: Using Online Scanning Services for Censorship Circumvention., , and . Privacy Enhancing Technologies, volume 7981 of Lecture Notes in Computer Science, page 185-204. Springer, (2013)Censors' Delay in Blocking Circumvention Proxies., and . FOCI, USENIX Association, (2016)Blocking-resistant communication through domain fronting., , , , and . PoPETs, 2015 (2): 46-64 (2015)Proxy Blocking Latency., and . CoRR, (2016)Fingerprintability of WebRTC., and . CoRR, (2016)A Usability Evaluation of Tor Launcher., , , , , and . Proc. Priv. Enhancing Technol., 2017 (3): 90 (2017)Do You See What I See? Differential Treatment of Anonymous Users., , , , , , , and . NDSS, The Internet Society, (2016)Fingerprinting Web Users Through Font Metrics., and . Financial Cryptography, volume 8975 of Lecture Notes in Computer Science, page 107-124. Springer, (2015)A better zip bomb.. WOOT @ USENIX Security Symposium, USENIX Association, (2019)