2008 |
13 | EE | Andriy Panchenko,
Lexi Pimenidis,
Johannes Renner:
Performance Analysis of Anonymous Communication Channels Provided by Tor.
ARES 2008: 221-228 |
12 | EE | Thomas Deselaers,
Lexi Pimenidis,
Hermann Ney:
Bag-of-visual-words models for adult image classification and filtering.
ICPR 2008: 1-4 |
11 | | Dogan Kesdogan,
Vinh Pham,
Lexi Pimenidis:
Analyse der Verkettbarkeit in nutzergesteuerten Identitätsmanagementsystemen.
Sicherheit 2008: 17-30 |
2007 |
10 | EE | David R. Piegdon,
Lexi Pimenidis:
Targeting Physically Addressable Memory.
DIMVA 2007: 193-212 |
9 | EE | Olaf Landsiedel,
Lexi Pimenidis,
Klaus Wehrle,
Heiko Niedermayer,
Georg Carle:
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks.
GLOBECOM 2007: 64-69 |
8 | EE | Andriy Panchenko,
Lexi Pimenidis:
Using Trust to Resist Censorship in the Presence of Collusion.
SEC 2007: 409-420 |
2006 |
7 | EE | Andriy Panchenko,
Lexi Pimenidis:
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.
Communications and Multimedia Security 2006: 240-251 |
6 | EE | Zinaida Benenson,
Lexi Pimenidis,
Felix C. Freiling,
Stefan Lucks:
Authenticated Query Flooding in Sensor Networks.
PerCom Workshops 2006: 644-647 |
5 | EE | Zinaida Benenson,
Felix C. Freiling,
Ernest Hammerschmidt,
Stefan Lucks,
Lexi Pimenidis:
Authenticated Query Flooding in Sensor Networks.
SEC 2006: 38-49 |
4 | | Lexi Pimenidis:
A Method for Degradation of Anonymity on Mix Systems for E-Mail and Surfing the WWW.
Sicherheit 2006: 155-158 |
3 | | Sebastian Clauß,
Stefan Schiffner,
Sandra Steinbrecher,
Dogan Kesdogan,
Tobias Kölsch,
Lexi Pimenidis:
Identitätsmanagement und das Risiko der Re-Identifikation.
Sicherheit 2006: 188-191 |
2005 |
2 | | Lexi Pimenidis:
A Practical Approach to Tranparent und Usable Anonymity Networks.
Sicherheit 2005: 245-248 |
2004 |
1 | EE | Dogan Kesdogan,
Lexi Pimenidis:
The Hitting Set Attack on Anonymity Protocols.
Information Hiding 2004: 326-339 |