Publications
The list of publications below is provided by TU Dresden's Research Information System (FIS). It offers an overview of the publications of the Chair of Privacy and Security (formerly Datenschutz und Datensicherheit). For a list of publications by Florian Tschorsch and his team, please refer to the DBLP Computer Science Bibliography.
151 Entries
2015
-
End-to-End Key Establishment with Physical Layer Key Generation and Specific Attacker Models, 2015, Physical and Data-Link Security Techniques for Future Communication Systems. Springer, p. 93–110Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Chapter in book/Anthology/Report
2014
-
A simple and secure e-ticketing system for intelligent public transportation based on NFC, 27 Oct 2014, URB-IOT '14: Proceedings of the First International Conference on IoT in Urban Space. Association for Computing Machinery (ACM), New York, p. 19-24, 6 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Modeling communication delays for network coding and routing for error-prone transmission, 1 Aug 2014, Third International Conference on Future Generation Communication Technologies (FGCT 2014). Wiley-IEEE PressElectronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network, 1 Feb 2014, Proceedings of the Network and Distributed System Security Symposium (NDSS~'14)Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Analysis of Parallel Applications on a High Performance-Low Energy Computer., 2014, p. 474-485, 12 p.Electronic (full-text) versionResearch output: Contribution to conferences > Paper
2013
-
An Algorithm for Privacy-Preserving Distributed User Statistics, Oct 2013, In: Computer Networks. 57, 14, p. 2775-2787, 13 p.Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
How (not) to Build a Transport Layer for Anonymity Overlays, 1 Mar 2013, In: ACM SIGMETRICS Performance Evaluation Review (PER). 40, 4, p. 101-106, 6 p.Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
IPv6 address obfuscation by intermediate middlebox in coordination with connected devices, 2013, Advances in Communication Networking : 19th EUNICE/IFIP WG 6.6 International Workshop, Proceedings. Springer, Berlin [u. a.], p. 148-160, 13 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
2012
-
How (not) to Build a Transport Layer for Anonymity Overlays, 1 Jun 2012, ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy (PADE~'12). 5 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
2011
-
Tor is unfair -- And what to do about it, 1 Oct 2011, Proceedings of the 36th IEEE International Conference on Local Computer Networks (LCN~'11). p. 432-440, 9 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution