Publications
The list of publications below is provided by TU Dresden's Research Information System (FIS). It offers an overview of the publications of the Chair of Privacy and Security (formerly Datenschutz und Datensicherheit). For a list of publications by Florian Tschorsch and his team, please refer to the DBLP Computer Science Bibliography.
147 Entries
2025
-
Security, Privacy, and Resilience Controls for the 6G End-to-End System Developed in Hexa-X-II , 3 Jun 2025, 2025 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit). Poznan, Poland, 6 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Improving Kademlia Lookup Privacy through Query Obfuscation. , 14 May 2025, p. 1345-1352, 8 p.Electronic (full-text) versionResearch output: Contribution to conferences > Paper
-
BERMUDA: A BPSec-Compatible Key Management Scheme for DTNs , 2025, p. 219-233, 15 p.Electronic (full-text) versionResearch output: Contribution to conferences > Paper
-
PrivTru: A Privacy-by-Design Data Trustee Minimizing Information Leakage. , 2025, p. 104-118, 15 p.Electronic (full-text) versionResearch output: Contribution to conferences > Paper
-
The Last Hop Attack: Why Loop Cover Traffic over Fixed Cascades Threatens Anonymity. , 2025, In: Proceedings on privacy enhancing technologies : PoPETs. 2025, 2, p. 382-397Electronic (full-text) versionResearch output: Contribution to journal > Research article
2024
-
On Integrating Sphinx in IPFS. , 4 Nov 2024, p. 753-754, 2 p.Electronic (full-text) versionResearch output: Contribution to conferences > Poster
-
Improving Reliability in Network-on-Chip with Trust-based Adaptive Routing Approaches , 29 Oct 2024, 2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings: NorCAS. Nurmi, J., Rodrigues, J., Pezzarossa, L., Aberg, V. & Behmanesh, B. (eds.). IEEE, p. 1-7Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Payment Censorship in the Lightning Network Despite Encrypted Communication. , Sep 2024, p. 12:1-12:24Electronic (full-text) versionResearch output: Contribution to conferences > Paper
-
From Theory to Comprehension: A Comparative Study of Differential Privacy and k-Anonymity , Jun 2024, CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy. p. 221 - 232, 12 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Exploring the design space of privacy-enhanced content discovery for bitswap , 28 Jan 2024, In: Computer communications : the international journal for the computer and telecommunications industry. 217 (2024), p. 12-24, 13 p.Electronic (full-text) versionResearch output: Contribution to journal > Research article