What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Thomas Engel
Google Scholar
13
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/popets
Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure.
Amirhossein Adavoudi Jolfaei
Andy Rupp
Stefan Schiffner
Thomas Engel
2023
journals/popets
Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance.
Sebastian Pahl
Florian Adamsky
Daniel Kaiser
Thomas Engel
2020
conf/ccs
TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting.
Wladimir De la Cadena
Asya Mitseva
Jens Hiller
Jan Pennekamp
Sebastian Reuter
Julian Filter
Thomas Engel
Klaus Wehrle
Andriy Panchenko
2020
conf/sec
Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor.
Asya Mitseva
Marharyta Aleksandrova
Thomas Engel
Andriy Panchenko
2019
conf/ccs
POSTER: Traffic Splitting to Counter Website Fingerprinting.
Wladimir De la Cadena
Asya Mitseva
Jan Pennekamp
Jens Hiller
Fabian Lanze
Thomas Engel
Klaus Wehrle
Andriy Panchenko
2018
conf/wisec
WLAN Device Fingerprinting using Channel State Information (CSI).
Florian Adamsky
Tatiana Retunskaia
Stefan Schiffner
Christian Köbel
Thomas Engel
2016
conf/ccs
POSTER: Fingerprinting Tor Hidden Services.
Asya Mitseva
Andriy Panchenko
Fabian Lanze
Martin Henze
Klaus Wehrle
Thomas Engel
2016
conf/ndss
Website Fingerprinting at Internet Scale.
Andriy Panchenko
Fabian Lanze
Jan Pennekamp
Thomas Engel
Andreas Zinnen
Martin Henze
Klaus Wehrle
2014
conf/ccs
Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature.
Fabian Lanze
Andriy Panchenko
Benjamin Braatz
Thomas Engel
2013
conf/esorics
Advanced Detection Tool for PDF Threats.
Quentin Jérome
Samuel Marchal
Radu State
Thomas Engel
2013
conf/cns
Aggregated representations and metrics for scalable flow analysis.
Jérôme François
Radu State
Thomas Engel
2012
conf/esorics
Security Monitoring for Content-Centric Networking.
David Goergen
Thibault Cholez
Jérôme François
Thomas Engel
1998
conf/icisc
The flood-gate principle - a hybrid approach to a high security solution.
Ernst Georg Haffner
Thomas Engel
Christoph Meinel
Coauthors
Amirhossein Adavoudi Jolfaei
(1)
Andreas Zinnen
(1)
Andriy Panchenko
(6)
Andy Rupp
(1)
Asya Mitseva
(4)
Benjamin Braatz
(1)
Christian Köbel
(1)
Christoph Meinel
(1)
Daniel Kaiser
(1)
David Goergen
(1)
Ernst Georg Haffner
(1)
Fabian Lanze
(4)
Florian Adamsky
(2)
Jan Pennekamp
(3)
Jens Hiller
(2)
Jérôme François
(2)
Julian Filter
(1)
Klaus Wehrle
(4)
Marharyta Aleksandrova
(1)
Martin Henze
(2)
Quentin Jérome
(1)
Radu State
(2)
Samuel Marchal
(1)
Sebastian Pahl
(1)
Sebastian Reuter
(1)
Stefan Schiffner
(2)
Tatiana Retunskaia
(1)
Thibault Cholez
(1)
Thomas Engel
(13)
Wladimir De la Cadena
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to