Publications
The list of publications below is provided by TU Dresden's Research Information System (FIS). It offers an overview of the publications of the Chair of Privacy and Security (formerly Datenschutz und Datensicherheit). For a list of publications by Florian Tschorsch and his team, please refer to the DBLP Computer Science Bibliography.
150 Entries
2020
-
Trust and Privacy in Process Analytics, Nov 2020, In: Enterprise modelling and information systems architectures : international journal of conceptual modeling. 15, 8Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks, Oct 2020, ACM Conference on Advances in Financial Technologies (AFT~'20). p. 214–227Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Enabling Reference Verifiability for the World Wide Web with Webchain, Oct 2020, In: ACM Transactions on Internet Technology (TOIT). 20, 4, p. 35:1-35:23Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
Every Query Counts: Analyzing the Privacy Loss of Exploratory Data Analyses, Sep 2020, 15th ESORICS Workshop on Data Privacy Management (DPM~'20). p. 258–266Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
APIC: A Paper Discussion Club on Advanced Protocols of Internet Communications, Aug 2020, ACM SIGCOMM Education Workshop (SigcommEdu~'20)Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
PredicTor: Predictive Congestion Control for the Tor Network, Aug 2020, IEEE Conference on Control Technology and Applications (CCTA~'20). p. 863-870Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Quantifying the Re-identification Risk of Event Logs for Process Mining, Jun 2020, International Conference on Advanced Information Systems Engineering (CAiSE~'20). p. 252–267Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Managing Latency and Excess Data Dissemination in Fog-Based Publish/Subscribe Systems, Apr 2020, IEEE International Conference on Fog Computing (ICFC~'20). p. 9-16Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts, Apr 2020, IEEE International Conference on Decentralized Applications (DAPPS~'20). p. 164-168Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Enabling and Optimizing MACsec for Industrial Environments (Extended Abstract), 2020, 2020 16th IEEE International Conference on Factory Communication Systems (WFCS). p. 1-4, 4 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution