Lexi Pimenidis

According to our database1, Lexi Pimenidis authored at least 24 papers between 2004 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Visual Search in Authentication Systems Based on Memorized Faces: Effects of Memory Load and Retention Interval.
Int. J. Hum. Comput. Interact., 2014

2011
Further Privacy Mechanisms.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Datenschutz und Identitätsmanagement für Communities - Communities für Datenschutz und Identitätsmanagement.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

2010
Cryptographic Protocol Analysis of AN.ON.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
A Kademlia-Based Node Lookup System for Anonymization Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

Facilitating the Adoption of Tor by Focusing on a Promising Target Group.
Proceedings of the Identity and Privacy in the Internet Age, 2009

SHALON: Lightweight Anonymization Based on Open Standards.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
The impact of the retention of traffic and location data on the internet user - A critical discussion.
Datenschutz und Datensicherheit, 2008

Analyse der Verkettbarkeit in nutzergesteuerten Identitätsmanagementsystemen.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Cross-layer attack on anonymizing networks.
Proceedings of the 2008 International Conference on Telecommunications, 2008

Bag-of-visual-words models for adult image classification and filtering.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Performance Analysis of Anonymous Communication Channels Provided by Tor.
Proceedings of the The Third International Conference on Availability, 2008

2007
Using Trust to Resist Censorship in the Presence of Collusion.
Proceedings of the New Approaches for Security, 2007

Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks.
Proceedings of the Global Communications Conference, 2007

Targeting Physically Addressable Memory.
Proceedings of the Detection of Intrusions and Malware, 2007

2006
Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

The Lower Bound of Attacks on Anonymity Systems - A Unicity Distance Approach.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

A Method for Degradation of Anonymity on Mix Systems for E-Mail and Surfing the WWW.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Identitätsmanagement und das Risiko der Re-Identifikation.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Authenticated Query Flooding in Sensor Networks.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Authenticated Query Flooding in Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.
Proceedings of the Communications and Multimedia Security, 2006

2005
A Practical Approach to Tranparent und Usable Anonymity Networks.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

2004
The Hitting Set Attack on Anonymity Protocols.
Proceedings of the Information Hiding, 6th International Workshop, 2004


  Loading...