×
Target groups Quicklinks
OCEL (Object-Centric Event Log) 2.0 Specification Author(s) Berti, Alessandro, Koren, Istvan, Adams, Jan Niklas, Park, Gyunam, Knopp, Benedikt, Graves, Nina, Rafiei, Majid, Liß, Lukas, Tacke Genannt Unterberg, Leah, Zhang, Yisong, Schwanen, Christopher, Pegoraro, Marco, Aalst, Wil van der Type Scientific Article ref. Year of publication 2024 Source arXiv, S. 1 - 49 URL https://arxiv.org/abs/2403.01975
Thwarting Last-Minute Voter Coercion Author(s) Giustolisi, Rosario, Sheikhi‐Garjan, Maryam, Schuermann, Carsten Type Conference Proceeding refering Year of publication 2024 Source 45th IEEE Symposium on Security and Privacy Sponsored by the IEEE Computer Society Technical Committee on Security and Privacy in cooperation with the International Association for Cryptologic Research URL https://eprint.iacr.org/2023/1876
A fast NTRU software implementation based on 5-way TMVP Author(s) Yaman Gökce, Neslihan, Gökce, Anıl Burak, Cenk, Murat Type Scientific Article ref. Year of publication 2024 Publisher name Elsevier BV Post-quantum cryptography; Lattice-based cryptography; Toeplitz matrices; NTRU; TMVP; Polynomial multiplication Source Journal of Information Security and Applications Volume 81 ISSN 2214-2126 DOI https://doi.org/10.1016/j.jisa.2023.103688
Stop, don't click here anymore: boosting website fingerprinting by considering sets of subpages Author(s) Mitseva, Asya, Panchenko, Andriy Type Conference Proceeding refering Year of publication 2024 Source Proceedings of the 33rd USENIX Security Symposium (USENIX Sec 2024), Philadelphia, PA, USA, August 14-16, 2024, S. 4139 - 4156 ISBN 978-1-939133-44-1 URL https://www.usenix.org/system/files/usenixsecurity24-mitseva.pdf https://dblp.org/rec/conf/uss/Mitseva024.html
Efficient cleansing in coercion-resistant voting Author(s) Giustolisi, Rosario, Sheikhi‐Garjan, Maryam Type Conference Proceeding refering Year of publication 2024 Publisher name Springer, Cham Source Electronic Voting : 9th International Joint Conference, E-Vote-ID 2024, Tarragona, Spain, October 2–4, 2024, Proceedings, S. 72 - 88 ISBN 978-3-031-72243-1 978-3-031-72244-8 DOI https://doi.org/10.1007/978-3-031-72244-8_5
A human-AI framework to design collaborative cyber physical systems Author(s) Nazarenko, Artem A., Camarinha-Matos, Luis M. Type part of book (chapter) Year of publication 2024 Publisher name Cham : Springer Nature Switzerland Source IFIP Advances in Information and Communication Technology, S. 28 - 42 ISBN 9783031638503 DOI https://doi.org/10.1007/978-3-031-63851-0_2 IFIP Advances in Information and Communication Technology ; volume 716
DeVoS: Deniable Yet Verifiable Vote Updating Author(s) Müller, Johannes, Pejó, Balázs, Pryvalov, Ivan Type Conference Proceeding refering Year of publication 2024 Source Proceedings on Privacy Enhancing Technologies, S. 357 - 378 URL https://petsymposium.org/popets/2024/popets-2024-0021.pdf DOI https://doi.org/10.56553/popets-2024-0021
Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research Author(s) Mitseva, Asya, Thierse, Paul, Hoffmann, Harald, Er, Devran, Panchenko, Andriy Editor(s) Katsikas, Sokratis Type Conference Proceeding refering Year of publication 2023 Publisher name Cham : Springer International Publishing Source Computer Security, ESORICS 2022 International WorkshopsCyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022 Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers, S. 379 - 397 ISBN 978-3-031-25459-8 978-3-031-25460-4 DOI https://doi.org/10.1007/978-3-031-25460-4_22 Lecture notes in computer science ; 13785
Robust principal component analysis based on discriminant information Author(s) Gao, Yunlong, Lin, Tingting, Zhang, Yisong, Luo, Sizhe, Nie, Feiping Type Conference Proceeding refering Year of publication 2023 Publisher name IEEE Principal component analysis; entropy regularization; robustness Source IEEE Transactions on Knowledge and Data Engineering, S. 1991 - 2003 DOI https://doi.org/10.1109/TKDE.2021.3093447
Explorative Process Discovery Using Activity Projections Author(s) Zhang, Yisong, Aalst, Wil van der Type Conference Proceeding refering Year of publication 2023 Publisher name Springer, Cham Process mining; Petri nets; Log projection; ProM Source International Conference on Applications and Theory of Petri Nets and Concurrency, PETRI NETS 2023, S. 229 - 239 ISBN 978-3-031-33619-5 978-3-031-33620-1 DOI https://doi.org/10.1007/978-3-031-33620-1_13 Lecture Notes in Computer Science ; vol 13929
Receipt-Free Electronic Voting from zk-SNARK Author(s) Sheikhi‐Garjan, Maryam, Giustolisi, Rosario, Schuermann, Carsten Type conference publication Year of publication 2023 Publisher name SCITEPRESS - Science and Technology Publications Source Proceedings of the 20th International Conference on Security and Cryptography, S. 254 - 266 ISBN 978-989-758-666-8 DOI https://doi.org/10.5220/0012140000003555
Supersingular Isogeny-based Ring Signature Author(s) Sheikhi‐Garjan, Maryam, Orhon Kılıç, N. Gamze, Cenk, Murat Type Scientific Article ref. Year of publication 2023 Publisher name Seref Sagiroglu Source International Journal of Information Security Science, S. 32 - 57 Volume 12 Issue/Journal number 1 ISSN 2147-0030 DOI https://doi.org/10.55859/ijiss.1187756
SoK: Secure E-Voting with Everlasting Privacy. Author(s) Haines, Thomas, Mosaheb, Rafieh, Müller, Johannes, Pryvalov, Ivan Type Conference Proceeding refering Year of publication 2023 electronic voting; everlasting privacy; protocol analysis Source Thomas Haines, Rafieh Mosaheb, Johannes Müller, Ivan Pryvalov. "SoK: Secure E-Voting with Everlasting Privacy." In Proceedings on Privacy Enhancing Technologies (PoPETS), 2023., S. 279 - 293 DOI https://doi.org/10.56553/popets-2023-0017
Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls Author(s) Moreno, José Miguel, Pastrana, Sergio, Reelfs, Jens Helge, Vallina, Pelayo, Panchenko, Andriy, Smaragdakis, Georgios, Hohlfeld, Oliver, Vallina-Rodriguez, Narseo, Tapiador, Juan Type Scientific Article ref. Year of publication 2023 Side Channels; Disinformation; Propaganda; User-Generated Content; Russia; Ukraine; Tripadvisor; Google Maps; VKontakte URL https://arxiv.org/abs/2302.00598 DOI https://doi.org/10.48550/arXiv.2302.00598
Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond Author(s) Bartsch, Witali, Gope, Prosanta, Kavun, Elif, Millwood, Owen, Panchenko, Andriy, Pasikhani, Aryan, Polian, Ilia Type Conference Proceeding refering Year of publication 2023 Publisher name SciTePress Secure Processor Architecture; Secure IoT; Hardware Fingerprinting; PUFs; Attack-Resilient Hardware Source Proceedings of the 9th International Conference on Information Systems Security and Privacy ICISSP - Volume 1, S. 583 - 591 ISBN 978-989-758-624-8 DOI https://doi.org/10.5220/0011726900003405
A Survey on Controller Area Network Reverse Engineering Author(s) Buscemi, Alessio, Turcanu, Ion, Castignani, German, Panchenko, Andriy, Engel, Thomas, Shin, Kang G. Type Scientific Article ref. Year of publication 2023 Publisher name IEEE Can bus; reverse engineering; security; connected Vechiles Source IEEE Communications Surveys & Tutorials, S. 1445 - 1481 Volume 25 Issue/Journal number 3,3 ISSN 1553-877X URL https://ieeexplore.ieee.org/abstract/document/10092880 DOI https://doi.org/10.1109/COMST.2023.3264928
Security and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor Author(s) Mitseva, Asya, Alexandrova, Marharyta, Panchenko, Andriy Type Scientific Article ref. Year of publication 2023 BGP routing attacks; Tor; Onion routing; Privacy; Traffic analysis Source Computers and Security Volume 132 ISSN 1872-6208 0167-4048 DOI https://doi.org/10.1016/j.cose.2023.103374
A Framework for Service-Oriented Architecture (SOA)-Based IoT Application Development Author(s) Giao, Joao, Nazarenko, Artem A., Luis-Ferreira, Fernando, Gonçalves, Diogo, Sarraipa, Joao Type Scientific Article ref. Year of publication 2022 application programming interfaces; Internet of Things; interoperability; middleware; modular construction Source Processes, S. 1 - 25 Volume 10 Issue/Journal number 9 ISSN 2227-9717 URL https://www.mdpi.com/2227-9717/10/9/1782 DOI https://doi.org/10.3390/pr10091782
Zero-defect manufacturing terminology standardization: Definition, improvement, and harmonization Author(s) Sousa, João, Nazarenko, Artem A., Grunewald, Christian, Psarommatis, Foivos, Fraile, Francisco, Meyer, Olga, Sarraipa, João Type Scientific Article ref. Year of publication 2022 zero-defect manufacturing (ZDM); terminology; industrie 4.0; quality management system; inspection Source Frontiers in Manufacturing Technology Volume 2 ISSN 2813-0359 DOI https://doi.org/10.3389/fmtec.2022.947474
Data Volume Reduction for Deep Packet Inspection by Multi-layer Application Determination Author(s) Vogel, Michael, Schuster, Franka, Kopp, Fabian Malte, König, Hartmut Type Conference Proceeding refering Year of publication 2022 Publisher name IEEE Source 2022 IEEE International Conference on Cyber Security and Resilience (CSR), 27-29 July 2022, Rhodes, Greece ISBN 978-1-6654-9952-1 978-1-6654-9953-8 URL https://ieeexplore.ieee.org/abstract/document/9850293 DOI https://doi.org/10.1109/CSR54599.2022.9850293
KI-basierte Angriffserkennung: Von der Blackbox zum verständlichen System Author(s) Schuster, Franka, Larisch, René Type Conference Proceeding refering Year of publication 2022 Source 54. Kraftwerkstechnisches Kolloquium 2022 URL https://tu-dresden.de/ing/maschinenwesen/ifvu/evt/kraftwerkstechnisches-kolloquium/54-kraftwerkstechnisches-kolloquium-2022-1
CUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research Author(s) Pennekamp, Jan, Henze, Martin, Zinnen, Andreas, Lanze, Fabian, Wehrle, Klaus, Panchenko, Andriy Type Conference Proceeding refering Year of publication 2022 Traffic Analysis;Website Fingerprinting; Privacy; Anonymous Communication; Onion Routing; Web Privacy Source 38th Annual Computer Security Applications Conference (ACSAC 2022), Austin, Texas, USA, December 5-9, 2022. URL https://www.acsac.org/2022/program/artifacts_competition/
A Framework for Constructing Single Secret Leader Election from MPC. Author(s) Backes, Michael, Berrang, Pascal, Hanzlik, Lucjan, Pryvalov, Ivan Type Conference Proceeding refering Year of publication 2022 Publisher name Springer Source Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov. "A Framework for Constructing Single Secret Leader Election from MPC." In Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II, pp.672-691, Springer., S. 672 - 691 URL https://link.springer.com/chapter/10.1007/978-3-031-17146-8_33 DOI https://doi.org/10.1007/978-3-031-17146-8_33 LNCS, volume 13555
POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages Author(s) Mitseva, Asya, Pennekamp, Jan, Lohmöller, Johannes, Ziemann, Torsten, Hoerchner, Carl, Wehrle, Klaus, Panchenko, Andriy Type Conference Proceeding refering Year of publication 2021 Publisher name New York : ACM Press Source Proceedings of the 28th ACM Conference on Computer and Communications Security (ACM CCS 2021), Seoul, Virtual Event, South Korea, November 2021, S. 2411 - 2413 ISBN 978-1-4503-8454-4 DOI https://doi.org/10.1145/3460120.3485347
WhisperChord: Scalable and Secure Node Discovery for Overlay Networks Author(s) Panchenko, Andriy, Mitseva, Asya, Knabe, Sara Type Conference Proceeding refering Year of publication 2021 Publisher name IEEE Source IEEE 46th Conference on Local Computer Networks (LCN), Edmonton, AB, Canada, 4-7 Oct. 2021, S. 170 - 177 ISBN 978-1-6654-1886-7 978-1-6654-4800-0 DOI https://doi.org/10.1109/LCN52139.2021.9525008
GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks Author(s) Panchenko, Andriy, Mitseva, Asya, Ziemann, Torsten, Hering, Till Type Conference Proceeding refering Year of publication 2021 Publisher name Cham : Springer Node lookup; DHT; Tor; Onion routing; Anonymity Source Security and Privacy in Communication Networks : 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part I, S. 123 - 143 ISBN 978-3-030-90018-2 DOI https://doi.org/10.1007/978-3-030-90019-9_7 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Demo: Traffic Splitting for Tor – A Defense against Fingerprinting Attacks Author(s) Reuter, Sebastian, Hiller, Jens, Pennekamp, Jan, Panchenko, Andriy, Wehrle, Klaus Type Conference Proceeding refering Year of publication 2021 Onion Routing; Website Fingerprinting; Multipath Traffic; Privacy Source Conference on Networked Systems 2021 (NetSys 2021) DOI https://doi.org/10.14279/tuj.eceasst.80.1151.1128
Discriminant analysis based on reliability of local neighborhood Author(s) Gao, Yunlong, Zhang, Yisong, Pan, Jinyan, Luo, Sizhe, Yang, Chengyu Type Scientific Article ref. Year of publication 2021 Dimensionality reduction; Discriminant analysis; Manifold learning; Graph learning; Adjacency factor Source Expert Systems with Applications Volume 175 ISSN 1873-6793 0957-4174 DOI https://doi.org/10.1016/j.eswa.2021.114790
Robust PCA Using Adaptive Probability Weighting Author(s) Gao, Yunlong, Luo, Si-Zhe, Pan, Jin-Yan, Chen, Bai-Hua, Zhang, Yi-Song Type Scientific Article ref. Year of publication 2021 Principle component analysis (PCA); weighted principal component analysis (WPCA); dimensionality reduction; robustness Source Acta Automatica Sinica, S. 825 - 838 Volume 47 Issue/Journal number 4 ISSN 0254-4156 DOI https://doi.org/10.16383/j.aas.c180743
Trustless, Censorship-Resilient and Scalable Votings in the Permission-Based Blockchain Model Author(s) Gajek, Sebastian, Lewandowsky, Marco Type Conference Proceeding refering Year of publication 2021 Publisher name Springer Voting; Functional encryption; Blockchain; Hyperledger Source Euro-Par 2020 International Workshops, Warsaw, Poland, August 24–25, 2020, Revised Selected Papers, S. 54 - 65 ISBN 978-3-030-71592-2 978-3-030-71593-9 DOI https://doi.org/10.1007/978-3-030-71593-9_5 Lecture Notes in Computer Science (LNCS) ; volume 12480
Analyzing PeerFlow - A Bandwidth Estimation System for Untrustworthy Environments Author(s) Mitseva, Asya, Engel, Thomas, Panchenko, Andriy Editor(s) Reinhardt, Delphine, Langweg, Hanno, Witt, Bernhard C., Fischer, Mathias Type Conference Proceeding refering Year of publication 2020 Publisher name Bonn : Gesellschaft für Informatik Source Sicherheit 2020 : Sicherheit, Schutz und Zuverlässigkeit ; Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ; 17.- 20. März 2020 in Göttingen, S. 29 - 40 ISBN 978-3-88579-695-4 DOI https://doi.org/10.18420/sicherheit2020_02 GI-Edition / Proceedings ; Volume P-301 Lecture notes in informatics
Security and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor Author(s) Mitseva, Asya, Aleksandrova, Marharyta, Engel, Thomas, Panchenko, Andriy Type Conference Proceeding refering Year of publication 2020 Publisher name Cham : Springer Source ICT Systems Security and Privacy Protection : 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21–23, 2020, S. 219 - 233 ISBN 978-3-030-58201-2 978-3-030-58200-5 DOI https://doi.org/10.1007/978-3-030-58201-2_15 IFIP Advances in Information and Communication Technology book series IFIPAICT ; volume 580
TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting Author(s) De la Cadena, Wladimir, Mitseva, Asya, Hiller, Jens, Pennekamp, Jan, Reuter, Sebastian, Filter, Julian, Engel, Thomas, Wehrle, Klaus, Panchenko, Andriy Type Conference Proceeding refering Year of publication 2020 Publisher name New York : Association for Computing Machinery Traffic Analysis; Website Fingerprinting; Privacy; Anonymous Communication; Onion Routing; Web Privacy Source CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, October 2020, S. 1971 - 1985 ISBN 978-1-4503-7089-9 DOI https://doi.org/10.1145/3372297.3423351
Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications Author(s) De la Cadena, Wladimir, Kaiser, Daniel, Panchenko, Andriy, Engel, Thomas Type Conference Proceeding refering Year of publication 2020 Source 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), 24-27 Nov. 2020, Cambridge, MA, USA ISBN 978-1-7281-8326-8 978-1-7281-8327-5 DOI https://doi.org/10.1109/NCA51143.2020.9306702
Terrorist Video Detection System Based on Faster R-CNN and LightGBM Author(s) Yi, Chao, Wu, Shunxiang, Xi, Bin, Ming, Daodong, Zhang, Yisong, Zhou, Zhenwen Type Conference Proceeding refering Year of publication 2020 Source CSAE '20: Proceedings of the 4th International Conference on Computer Science and Application Engineering, S. 1 - 8 ISBN 978-1-4503-7772-0 URL https://dl.acm.org/doi/abs/10.1145/3424978.3425121 DOI https://doi.org/10.1145/3424978.3425121
Local Neighborhood Reliability Weighted Support Vector Machine Author(s) Gao, Yunlong, Zhang, Yisong, Chen, Baihua, Xiong, Yuhui Type conference publication Year of publication 2020 Publisher name IEEE SVM; margin; local neighbor; adjacency factor; outlier Source 2020 2nd International Conference on Industrial Artificial Intelligence (IAI), S. 1 - 6 ISBN 978-1-7281-8216-2 978-1-7281-8217-9 DOI https://doi.org/10.1109/IAI50351.2020.9262215
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing Author(s) Pennekamp, Jan, Hiller, Jens, Reuter, Sebastian, De la Cadena, Wladimir, Mitseva, Asya, Henze, Martin, Engel, Thomas, Wehrle, Klaus, Panchenko, Andriy Type Conference Proceeding refering Year of publication 2019 Publisher name IEEE Press Source Proceedings of the 27th annual IEEE International Conference on Network Protocols (Poster) (IEEE ICNP 2019), Chicago, Illinois, USA, October 2019 ISBN 978-1-7281-2700-2 978-1-7281-2701-9 URL https://ieeexplore.ieee.org/document/8888029 DOI https://doi.org/10.1109/ICNP.2019.8888029
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments Author(s) Hiller, Jens, Pennekamp, Jan, Dahlmanns, Markus, Henze, Martin, Panchenko, Andriy, Wehrle, Klaus Type Conference Proceeding refering Year of publication 2019 Publisher name IEEE Press Routing, Internet of Things, Protocols, Cryptography, Servers Source Proceedings of the 27th annual IEEE International Conference on Network Protocols (IEEE ICNP 2019), Chicago, Illinois, USA, October 2019 ISBN 978-1-7281-2700-2 978-1-7281-2701-9 URL https://ieeexplore.ieee.org/document/8888033 DOI https://doi.org/10.1109/ICNP.2019.8888033
POSTER: Traffic Splitting to Counter Website Fingerprinting Author(s) De La Cadena, Wladimir, Mitseva, Asya, Pennekamp, Jan, Hiller, Jens, Lanze, Fabian, Engel, Thomas, Wehrle, Klaus, Panchenko, Andriy Type Conference Proceeding refering Year of publication 2019 Publisher name New York : ACM Press Source CCS '19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, November 11 - 15, 2019., S. 2533 - 2535 ISBN 978-1-4503-6747-9 URL https://dl.acm.org/citation.cfm?doid=3319535.3363249 DOI https://doi.org/10.1145/3319535.3363249
Hi Doppelgänger: Towards Detecting Manipulation in News Comments Author(s) Pennekamp, Jan, Henze, Martin, Hohlfeld, Oliver, Panchenko, Andriy Type Conference Proceeding refering Year of publication 2019 Publisher name New York : ACM Source Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 4th Workshop on Computational Methods in Online Misbehavior (CyberSafety '19), May 13–17, 2019, San Francisco, CA, USA, S. 197 - 205 ISBN 978-1-4503-6675-5 DOI https://doi.org/10.1145/3308560.3316496
Analysis of Multi-path Onion Routing-based Anonymization Networks Author(s) De la Cadena, Wladimir, Kaiser, Daniel, Mitseva, Asya, Panchenko, Andriy, Engel, Thomas Editor(s) Foley, Simon N. Type Conference Proceeding refering Year of publication 2019 Publisher name Frankfurt am Main : Springer Source Data and Applications Security and Privacy XXXIII : 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15–17, 2019, Proceedings, S. 240 - 258 ISBN 978-3-030-22478-3 978-3-030-22479-0 URL https://link.springer.com/book/10.1007%2F978-3-030-22479-0 DOI https://doi.org/10.1007/978-3-030-22479-0_13 Lecture Notes in Computer Science book series ; volume 11559
Threshold verifiable multi‐secret sharing based on elliptic curves and Chinese remainder theorem Author(s) Sheikhi‐Garjan, Maryam, Bahramian, Mojtaba, Doche, Christophe Type Scientific Article ref. Year of publication 2019 Publisher name Institution of Engineering and Technology (IET) Source IET Information Security, S. 278 - 284 Volume 13 Issue/Journal number 3 ISSN 1751-8717 DOI https://doi.org/10.1049/iet-ifs.2018.5174
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup. Author(s) Backes, Michael, Hanzlik, Lucjan, Herzberg, Amir, Kate, Aniket, Pryvalov, Ivan Editor(s) Lin, Dongdai Type Conference Proceeding refering Year of publication 2019 Publisher name Springer Source Public-Key Cryptography – PKC 2019 : 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, S. 286 - 313 URL https://link.springer.com/chapter/10.1007/978-3-030-17253-4_10#Abs1 DOI https://doi.org/10.1007/978-3-030-17253-4_10
The state of affairs in BGP security: A survey of attacks and defenses Author(s) Mitseva, Asya, Panchenko, Andriy, Engel, Thomas Type Scientific Article ref. Year of publication 2018 Source Computer Communications, S. 45 - 60 Volume 124 ISSN 0140-3664 DOI https://doi.org/10.1016/j.comcom.2018.04.013
Analysis of Fingerprinting Techniques for Tor Hidden Services Author(s) Panchenko, Andriy, Mitseva, Asya, Henze, Martin, Lanze, Fabian, Engel, Thomas, Wehrle, Klaus Type conference publication Year of publication 2017 Publisher name New York, NY : ACM Source WPES '17 Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, Texas, USA, October 2017, S. 165 - 175 ISBN 978-1-4503-5175-1 DOI https://doi.org/10.1145/3139550.3139564
Dynamic RPL for multi-hop routing in IoT applications Author(s) Kharrufa, Harith, Al-Kashoash, Hayder, Al-Nidawi, Yaarob, Quezada Mosquera, Maria Fernanda, Kemp, Andrew H. Type Conference Proceeding refering Year of publication 2017 Publisher name IEEE Linear programming; Protocols; Mobile nodes; Measurement; Routing; Wireless sensor networks Source 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS) ISBN 978-3-901882-88-3 978-1-5090-4377-4 DOI https://doi.org/10.1109/WONS.2017.7888753
Website Fingerprinting at Internet Scale Author(s) Panchenko, Andriy, Lanze, Fabian, Zinnen, Andreas, Henze, Martin, Pennekamp, Jan, Engel, Thomas, Wehrle, Klaus Type conference publication Year of publication 2016 Publisher name Reston, VA : Internet Society Source Proceedings of the 23rd Internet Society (ISOC) Network and Distributed System Security Symposium (NDSS 2016), San Diego, USA, February 2016 ISBN 1-891562-41-X
POSTER: Fingerprinting Tor Hidden Services Author(s) Mitseva, Asya, Panchenko, Andriy, Lanze, Fabian, Henze, Martin, Engel, Thomas, Wehrle, Klaus Type Conference Proceeding refering Year of publication 2016 Publisher name New York : ACM Source In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). Association for Computing Machinery, New York, NY, USA, S. 1766 - 1768 ISBN 978-1-4503-4139-4 DOI https://doi.org/10.1145/2976749.2989054
Differentially private data aggregation with optimal utility Author(s) Backes, Michael, Herzberg, Amir, Kate, Aniket, Pryvalov, Ivan Type Conference Proceeding refering Year of publication 2016 Publisher name Springer Anonymity; Access privacy; Oblivious RAM; Out-sourced data; (Universal) Re-randomizable encryption; Oblivious PRF Source Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014, S. 316 - 325 URL https://link.springer.com/chapter/10.1007/978-3-319-45744-4_17 DOI https://doi.org/10.1145/2664243.2664263
Sistema de Generación de Aplicaciones Interactivas para TV Digital para la evaluación de servicios masivos Author(s) Cabezas, Gissela, Quezada Mosquera, Maria Fernanda, Bernal, Ivan Type Scientific Article ref. Year of publication 2013 Digital Terrestrial Television; DTT; ISDB-Tb; Ginga-NCL; return channel Source Revista Politécnica, S. 11 - 22 Volume 32 Issue/Journal number 2 URL https://revistapolitecnica.epn.edu.ec/ojs2/index.php/revista_politecnica2/article/view/35/pdf
This website uses cookies. There are two types of cookies: The first type supports the basic functionality of our website. The second allows us to improve our content for you by saving and analyzing pseudonymised user data. Since this second type is technically not required to run the website, you can withdraw your consent to those cookies at any time. For more information please visit our pages on data protection .
Settings
Accept mandatory Cookies
Accept all cookies
Save settings
×