Publications
The list of publications below is provided by TU Dresden's Research Information System (FIS). It offers an overview of the publications of the Chair of Privacy and Security (formerly Datenschutz und Datensicherheit). For a list of publications by Florian Tschorsch and his team, please refer to the DBLP Computer Science Bibliography.
151 Entries
2011
-
Distributed Privacy-Aware User Counting, Jul 2011, 4th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs~'11)Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
2010
-
Unleashing Tor, BitTorrent Co.: How to Relieve TCP Deficiencies in Overlays, 1 Oct 2010, Proceedings of the 35th IEEE International Conference on Local Computer Networks (LCN~'10). p. 320-323, 4 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Unleashing Tor, BitTorrent Co.: How to Relieve TCP Deficiencies in Overlays (Extended Version), 1 Aug 2010, 16 p.Electronic (full-text) versionResearch output: Preprint/documentation/report > Working paper
-
Secure logging of retained data for an anonymity service, 2010, Privacy and Identity Management for Life - 5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, 2009, Revised Selected Papers. Bezzi, M., Duquenoy, P., Fischer-Hubner, S., Zhang, G. & Hansen, M. (eds.). Springer Verlag, New York, p. 284-298, 15 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Trained to accept? A field experiment on consent dialogs, 2010, CHI '10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. p. 2403-2406, 4 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
2009
-
Data retention and anonymity services: Introducing a new class of realistic adversary models, 2009, The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6/11.6, 11.7/ FIDIS International Summer School, Revised Selected Papers. Matyas, V., Svenda, P., Fischer-Hubner, S. & Cvrcek, D. (eds.). Springer Verlag, New York, p. 92-106, 15 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
2007
-
Communication privacy, 1 Jan 2007, Digital Privacy: Theory, Technologies, and Practices. CRC Press, p. 19-46, 28 p.Research output: Contribution to book/conference proceedings/anthology/report > Chapter in book/Anthology/Report
2006
-
Low latency anonymous communication - How long are users willing to wait?, 2006, Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Proceedings. Springer, Berlin [u. a.], p. 221-237, 17 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Revocable anonymity, 2006, Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Proceedings. Springer, Berlin [u. a.], p. 206-220, 15 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Vergleich der Verfahren zur Verhinderung von Replay-Angriffen der Anonymisierungsdienste AN.ON und Tor, 2006, SICHERHEIT 2006 - Sicherheit - Schutz und Zuverlässigkeit: Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 20.-22. Februar 2006 in Magdeburg. Dittmann, J. (ed.). Gesellschaft für Informatik, Bonn, p. 183-187, 5 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution