Profil

WEINMANN Ralf-Philipp

University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)

Main Referenced Co-authors
BIRYUKOV, Alex  (4)
PUSTOGAROV, Ivan  (4)
CORON, Jean-Sébastien  (1)
Naccache, David (1)
Thill, Fabrice (1)
Main Referenced Keywords
Tor (4); privacy (3); anonymity (2); hidden service (2); anonymity network (1);
Main Referenced Unit & Research Centers
Security and Trust (1)
Main Referenced Disciplines
Computer science (5)

Publications (total 5)

The most downloaded
1623 downloads
BIRYUKOV, A., PUSTOGAROV, I., & WEINMANN, R.-P. (2013). Trawling for tor hidden services: Detection, measurement, deanonymization. In 2013 IEEE Symposium on Security and Privacy (SP). United States: IEEE Computer Society. doi:10.1109/SP.2013.15 https://hdl.handle.net/10993/17181

The most cited

222 citations (OpenAlex)

BIRYUKOV, A., PUSTOGAROV, I., & WEINMANN, R.-P. (2013). Trawling for tor hidden services: Detection, measurement, deanonymization. In 2013 IEEE Symposium on Security and Privacy (SP). United States: IEEE Computer Society. doi:10.1109/SP.2013.15 https://hdl.handle.net/10993/17181

BIRYUKOV, A., PUSTOGAROV, I., Thill, F., & WEINMANN, R.-P. (2014). Content and popularity analysis of Tor hidden services. In proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops. IEEE Computer Society.
Peer reviewed

BIRYUKOV, A., PUSTOGAROV, I., & WEINMANN, R.-P. (2013). Trawling for tor hidden services: Detection, measurement, deanonymization. In 2013 IEEE Symposium on Security and Privacy (SP). United States: IEEE Computer Society. doi:10.1109/SP.2013.15
Peer reviewed

BIRYUKOV, A., PUSTOGAROV, I., & WEINMANN, R.-P. (2012). TorScan: Deanonymizing Connections Using Topology Leaks. ERCIM News, (90), 29-29.
Peer reviewed

BIRYUKOV, A., PUSTOGAROV, I., & WEINMANN, R.-P. (2012). TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security (pp. 469-486). Springer.
Peer reviewed

CORON, J.-S., Naccache, D., TIBOUCHI, M., & WEINMANN, R.-P. (2009). Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures. In Proceedings of CRYPTO 2009 (pp. 428-444). Springer. doi:10.1007/978-3-642-03356-8_25
Peer reviewed

Contact ORBilu