Martin Burkhart
Martin Burkhart
Affiliation inconnue
Adresse e-mail validée de tik.ee.ethz.ch
Titre
Citée par
Citée par
Année
Does topology control reduce interference?
M Burkhart, P Von Rickenbach, R Wattenhofer, A Zollinger
Proceedings of the 5th ACM international symposium on Mobile ad hoc …, 2004
7832004
SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics
M Burkhart, M Strasser, D Many, X Dimitropoulos
USENIX Security Symposium, 2010
3552010
The role of network trace anonymization under attack
M Burkhart, D Schatzmann, B Trammell, E Boschi, B Plattner
ACM SIGCOMM Computer Communication Review 40 (1), 5-11, 2010
632010
Beyond shannon: Characterizing internet traffic with generalized entropy metrics
B Tellenbach, M Burkhart, D Sornette, T Maillart
International conference on passive and active network measurement, 239-248, 2009
622009
Accurate network anomaly classification with generalized entropy metrics
B Tellenbach, M Burkhart, D Schatzmann, D Gugelmann, D Sornette
Computer Networks 55 (15), 3485-3502, 2011
512011
Fast private set operations with sepia
D Many, M Burkhart, CX Dimitropoulos
TIK Report 345, 2012
502012
Fast privacy-preserving top-k queries using secret sharing
M Burkhart, X Dimitropoulos
2010 Proceedings of 19th International Conference on Computer Communications …, 2010
472010
Peeling away timing error in netflow data
B Trammell, B Tellenbach, D Schatzmann, M Burkhart
International Conference on Passive and Active Network Measurement, 194-203, 2011
292011
Inferring spammers in the network core
D Schatzmann, M Burkhart, T Spyropoulos
International Conference on Passive and Active Network Measurement, 229-238, 2009
292009
The risk-utility tradeoff for IP address truncation
M Burkhart, D Brauckhoff, M May, E Boschi
Proceedings of the 1st ACM workshop on Network data anonymization, 23-30, 2008
292008
Privacy-preserving distributed network troubleshooting—bridging the gap between theory and practice
M Burkhart, X Dimitropoulos
ACM Transactions on Information and System Security (TISSEC) 14 (4), 1-30, 2008
212008
Enabling collaborative network security with privacy-preserving data aggregation
M Burkhart
TIK-Schriftenreihe 125, 2011
132011
On the utility of anonymized flow traces for anomaly detection
M Burkhart, D Brauckhoff, M May
arXiv preprint arXiv:0810.1655, 2008
102008
SEPIA: Security through private information aggregation
M Burkhart, M Strasser, D Many, X Dimitropoulos
Arxiv preprint arXiv:0903.4258, 2009
92009
Analysis of interference in ad-hoc networks
M Burkhart, R Wattenhofer, A Zollinger
Master's thesis, Swiss Federal Institute of Technology Zurich, 2003
92003
Flow-level characteristics of spam and ham
D Schatzmann, M Burkhart, T Spyropoulos
arXiv preprint arXiv:0808.4104, 2008
82008
Reduce to the max: A simple approach for Massive-Scale Privacy-Preserving collaborative network measurements (Short paper)
F Ricciato, M Burkhart
International Workshop on Traffic Monitoring and Analysis, 100-107, 2011
72011
Pascal von Rickenbach, Roger Wattenhofer and Aaron Zollinger,”
M Burkhart
Does topology control reduce interference, 9-19, 0
7
Elementary secure-multiparty computation for massive-scale collaborative network monitoring: A quantitative assessment
A Iacovazzi, A D’Alconzo, F Ricciato, M Burkhart
Computer Networks 57 (17), 3728-3742, 2013
32013
Invasion of Privacy Using Fingerprinting Attacks
D Sauter, M Burkhart, D Schatzmann, B Plattner
Master Thesis MA-2008-22, ETH Zurich, 2009
32009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20