Cited By
View all- Gaballah SAbdullah LMühlhäuser MMarky K(2024)Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing TechniquesProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664516(1-11)Online publication date: 30-Jul-2024
- Aksoy AKesdoğan D(2024)Detecting Corruptive Noise Rounds for Statistical Disclosure Attacks2024 9th International Conference on Computer Science and Engineering (UBMK)10.1109/UBMK63289.2024.10773533(766-771)Online publication date: 26-Oct-2024
- Simos DGarn BSchreiber DLeithner MKuhn DKacker R(2024)On Combinatorial Security Testing for the Tor Anonymity Network Client2024 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)10.1109/ICSTW60967.2024.00047(207-210)Online publication date: 27-May-2024
- Show More Cited By