The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Lexi Pimenidis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andriy Panchenko, Lexi Pimenidis
    Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:240-251 [Conf]
  2. Dogan Kesdogan, Lexi Pimenidis
    The Hitting Set Attack on Anonymity Protocols. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:326-339 [Conf]
  3. Zinaida Benenson, Lexi Pimenidis, Felix C. Freiling, Stefan Lucks
    Authenticated Query Flooding in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:644-647 [Conf]
  4. Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis
    Authenticated Query Flooding in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:38-49 [Conf]
  5. Sebastian Clauß, Stefan Schiffner, Sandra Steinbrecher, Dogan Kesdogan, Tobias Kölsch, Lexi Pimenidis
    Identitätsmanagement und das Risiko der Re-Identifikation. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:188-191 [Conf]
  6. Lexi Pimenidis
    A Practical Approach to Tranparent und Usable Anonymity Networks. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:245-248 [Conf]
  7. Lexi Pimenidis
    A Method for Degradation of Anonymity on Mix Systems for E-Mail and Surfing the WWW. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:155-158 [Conf]
  8. David R. Piegdon, Lexi Pimenidis
    Targeting Physically Addressable Memory. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:193-212 [Conf]

  9. Performance Analysis of Anonymous Communication Channels Provided by Tor. [Citation Graph (, )][DBLP]


  10. Cryptographic Protocol Analysis of AN.ON. [Citation Graph (, )][DBLP]


  11. Bag-of-visual-words models for adult image classification and filtering. [Citation Graph (, )][DBLP]


  12. Using Trust to Resist Censorship in the Presence of Collusion. [Citation Graph (, )][DBLP]


  13. Analyse der Verkettbarkeit in nutzergesteuerten Identitätsmanagementsystemen. [Citation Graph (, )][DBLP]


  14. Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks. [Citation Graph (, )][DBLP]


  15. A Kademlia-Based Node Lookup System for Anonymization Networks. [Citation Graph (, )][DBLP]


  16. Facilitating the Adoption of Tor by Focusing on a Promising Target Group. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002