Publications
The list of publications below is provided by TU Dresden's Research Information System (FIS). It offers an overview of the publications of the Chair of Privacy and Security (formerly Datenschutz und Datensicherheit). For a list of publications by Florian Tschorsch and his team, please refer to the DBLP Computer Science Bibliography.
153 Entries
2020
-
Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation, 1 Dec 2020, In: EURASIP Journal on wireless communications and networking. 2020, 1, 114Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT, 16 Nov 2020, Proceedings of the IEEE 45th Conference on Local Computer Networks, LCN 2020. Tan, H., Khoukhi, L. & Oteafy, S. (eds.). IEEE Computer Society, p. 365-368, 4 p., 9314854Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Privacy-Preserving Public Key Infrastructure for Vehicular Networks, Nov 2020, Proceedings of the 45th IEEE Local Computer Networks (LCN~'20). p. 154-163Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Trust and Privacy in Process Analytics, Nov 2020, In: Enterprise modelling and information systems architectures : international journal of conceptual modeling. 15, 8Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks, Oct 2020, ACM Conference on Advances in Financial Technologies (AFT~'20). p. 214–227Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Enabling Reference Verifiability for the World Wide Web with Webchain, Oct 2020, In: ACM Transactions on Internet Technology (TOIT). 20, 4, p. 35:1-35:23Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
Every Query Counts: Analyzing the Privacy Loss of Exploratory Data Analyses, Sep 2020, 15th ESORICS Workshop on Data Privacy Management (DPM~'20). p. 258–266Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
APIC: A Paper Discussion Club on Advanced Protocols of Internet Communications, Aug 2020, ACM SIGCOMM Education Workshop (SigcommEdu~'20)Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
PredicTor: Predictive Congestion Control for the Tor Network, Aug 2020, IEEE Conference on Control Technology and Applications (CCTA~'20). p. 863-870Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Quantifying the Re-identification Risk of Event Logs for Process Mining, Jun 2020, International Conference on Advanced Information Systems Engineering (CAiSE~'20). p. 252–267Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution