Esfandiar Mohammadi
Esfandiar Mohammadi
Associate Professor (W2), Universität zu Lübeck, Lübeck
Geverifieerd e-mailadres voor uni-luebeck.de - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
AnoA: A Framework For Analyzing Anonymous Communication Protocols
M Backes, A Kate, P Manoharan, S Meiser, E Mohammadi
26th IEEE Computer Security Foundations Symposium (CSF), 163-178, 2013
872013
Provably secure and practical onion routing
M Backes, I Goldberg, A Kate, E Mohammadi
2012 IEEE 25th Computer Security Foundations Symposium, 369-385, 2012
632012
(Nothing else) MATor (s): Monitoring the Anonymity of Tor's Path Selection
M Backes, A Kate, S Meiser, E Mohammadi
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
482014
Computationally sound abstraction and verification of secure multi-party computations
M Backes, M Maffei, E Mohammadi
Conference on Foundations of Software Technology and Theoretical Computer …, 2010
352010
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two
D Das, S Meiser, E Mohammadi, A Kate
Cryptology ePrint Archive: Report, 954, 2017
332017
Ace: an efficient key-exchange protocol for onion routing
M Backes, A Kate, E Mohammadi
ACM Workshop on Privacy in the Electronic Society (WPES), 55-64, 2012
302012
Computational soundness results for ProVerif
M Backes, E Mohammadi, T Ruffing
International Conference on Principles of Security and Trust, 42-62, 2014
19*2014
TUC: Time-sensitive and Modular Analysis of Anonymous Communication
M Backes, P Manoharan, E Mohammadi
IEEE Computer Security Foundations Symposium (CSF), 2014
182014
Privacy-Preserving Accountable Computation
M Backes, D Fiore, E Mohammadi
18th European Symposium on Research in Computer Security (ESORICS), 38--56, 2013
142013
Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy
M Meiser, E Mohammadi
25th ACM Conference on Computer and Communications Security (CCS 2018), 2018
132018
Symbolic Malleable Zero-Knowledge Proofs
M Backes, F Bendun, M Maffei, E Mohammadi, K Pecina
Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 412-426, 2015
13*2015
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy
DM Sommer, S Meiser, E Mohammadi
Proceedings on Privacy Enhancing Technologies 2019 (2), 245-269, 2019
92019
Zero-Communication Seed Establishment for Anti-Jamming Techniques
K Pecina, E Mohammadi, C Pöpper
NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014
42014
Computational Soundness for Dalvik Bytecode
M Backes, R Künnemann, E Mohammadi
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
32016
Computational Soundness for Interactive Primitives
M Backes, E Mohammadi, T Ruffing
European Symposium on Research in Computer Security, 125-145, 2015
32015
Differential privacy with partial knowledge
D Desfontaines, E Mohammadi, E Krahmer, D Basin
arXiv preprint arXiv:1905.00650, 2019
22019
Deniable Upload and Download via Passive Participation
D Sommer, A Dhar, E Mohammadi, D Ronzani, S Capkun
16th USENIX Symposium on Networked Systems Design and Implementation (NSDI '19), 2019
2*2019
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor
M Backes, S Koch, S Meiser, E Mohammadi, C Rossow
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
22015
Comprehensive Anonymity Trilemma: User Coordination is not enough
D Das, S Meiser, E Mohammadi, A Kate
Proceedings on Privacy Enhancing Technologies 3, 356-383, 2020
2020
PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple
D Sommer, S Meiser, E Mohammadi
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20