Publications
The list of publications below is provided by TU Dresden's Research Information System (FIS). It offers an overview of the publications of the Chair of Privacy and Security (formerly Datenschutz und Datensicherheit). For a list of publications by Florian Tschorsch and his team, please refer to the DBLP Computer Science Bibliography.
148 Entries
2014
-
Modeling communication delays for network coding and routing for error-prone transmission , 1 Aug 2014, Third International Conference on Future Generation Communication Technologies (FGCT 2014). Wiley-IEEE PressElectronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network , 1 Feb 2014, Proceedings of the Network and Distributed System Security Symposium (NDSS~'14)Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Analysis of Parallel Applications on a High Performance-Low Energy Computer. , 2014, p. 474-485, 12 p.Electronic (full-text) versionResearch output: Contribution to conferences > Paper
2013
-
An Algorithm for Privacy-Preserving Distributed User Statistics , Oct 2013, In: Computer Networks. 57, 14, p. 2775-2787, 13 p.Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
How (not) to Build a Transport Layer for Anonymity Overlays , 1 Mar 2013, In: ACM SIGMETRICS Performance Evaluation Review (PER). 40, 4, p. 101-106, 6 p.Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
IPv6 address obfuscation by intermediate middlebox in coordination with connected devices , 2013, Advances in Communication Networking : 19th EUNICE/IFIP WG 6.6 International Workshop, Proceedings. Springer, Berlin [u. a.], p. 148-160, 13 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
2012
-
How (not) to Build a Transport Layer for Anonymity Overlays , 1 Jun 2012, ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy (PADE~'12). 5 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
2011
-
Tor is unfair -- And what to do about it , 1 Oct 2011, Proceedings of the 36th IEEE International Conference on Local Computer Networks (LCN~'11). p. 432-440, 9 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Distributed Privacy-Aware User Counting , Jul 2011, 4th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs~'11)Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
2010
-
Unleashing Tor, BitTorrent Co.: How to Relieve TCP Deficiencies in Overlays , 1 Oct 2010, Proceedings of the 35th IEEE International Conference on Local Computer Networks (LCN~'10). p. 320-323, 4 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution