Florian Tschorsch

Orcid: 0000-0001-6716-7225

According to our database1, Florian Tschorsch authored at least 81 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Progressive Pruning: Estimating Anonymity of Stream-Based Communication.
CoRR, 2024

Plausibly Deniable Content Discovery for Bitswap Using Random Walks.
CoRR, 2024

A Model-oriented Reasoning Framework for Privacy Analysis of Complex Systems.
CoRR, 2024

From Theory to Comprehension: A Comparative Study of Differential Privacy and <i>k</i>-Anonymity.
CoRR, 2024

Exploring the design space of privacy-enhanced content discovery for bitswap.
Comput. Commun., 2024

Poster: On Integrating Sphinx in IPFS.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

An applied Perspective: Estimating the Differential Identifiability Risk of an Exemplary SOEP Data Set.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

From Theory to Comprehension: A Comparative Study of Differential Privacy and k-Anonymity.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

Payment Censorship in the Lightning Network Despite Encrypted Communication.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024

2023
Kadcast-NG: A Structured Broadcast Protocol for Blockchain Networks.
IEEE/ACM Trans. Netw., December, 2023

Towards mobility reports with user-level privacy.
J. Locat. Based Serv., January, 2023

On the (Not So) Surprising Impact of Multi-Path Payments on Performance and Privacy in the Lightning Network.
IACR Cryptol. ePrint Arch., 2023

Tornado Vote: Anonymous Blockchain-Based Voting.
IACR Cryptol. ePrint Arch., 2023

Privacy-Enhanced Content Discovery for Bitswap.
Proceedings of the IFIP Networking Conference, 2023

QUICforge: Client-side Request Forgery in QUIC.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Improving Bitswap Privacy with Forwarding and Source Obfuscation.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Analyzing Continuous K<sub>s</sub>-Anonymization for Smart Meter Data.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Fair Reward Distribution in Federated Byzantine Agreement Systems.
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2023

Modeling Tor Network Growth by Extrapolating Consensus Data.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges.
ACM Trans. Internet Techn., November, 2022

Towards Smart Contract-based Verification of Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2022

Towards Optimization-Based Predictive Congestion Control for the Tor Network.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

Towards Standardized Mobility Reports with User-Level Privacy.
CoRR, 2022

IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks.
IEEE Commun. Surv. Tutorials, 2022

Raising the AWAREness of BFT Protocols for Soaring Network Delays.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Passively Measuring IPFS Churn and Network Size.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

On the Routing Convergence Delay in the Lightning Network.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

Am I Private and If So, how Many?: Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Blockchain-based technologies.
Internet Policy Rev., 2021

Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations.
IACR Cryptol. ePrint Arch., 2021

Towards Explaining Epsilon: A Worst-Case Study of Differential Privacy Risks.
IACR Cryptol. ePrint Arch., 2021

Erratum zu: Tor Relays an Universitäten.
Datenschutz und Datensicherheit, 2021

Tor Relays an Universitäten.
Datenschutz und Datensicherheit, 2021

Self-Determined Reciprocal Recommender System with Strong Privacy Guarantees.
CoRR, 2021

A QUIC(K) Way Through Your Firewall?
CoRR, 2021

Towards Verifiable Mutability for Blockchains.
CoRR, 2021

Operating Tor Relays at Universities: Experiences and Considerations.
CoRR, 2021

Onion Pass: Token-Based Denial-of-Service Protection for Tor Onion Services.
Proceedings of the IFIP Networking Conference, 2021

On the Impact of Attachment Strategies for Payment Channel Networks.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Bernoulli Meets PBFT: Modeling BFT Protocols in the Presence of Dynamic Failures.
Proceedings of the 16th Conference on Computer Science and Intelligence Systems, 2021

Empirical Analysis of On-chain Voting with Smart Contracts.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Modeling the Block Verification Time of Zcash.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

Poster: Towards Verifiable Mutability for Blockchains.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Self-Determined Reciprocal Recommender Systemwith Strong Privacy Guarantees.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Strong Anonymity is not Enough: Introducing Fault Tolerance to Planet-Scale Anonymous Communication Systems.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Enabling Reference Verifiability for the World Wide Web with Webchain.
ACM Trans. Internet Techn., 2020

SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts.
IACR Cryptol. ePrint Arch., 2020

Trust and Privacy in Process Analytics.
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2020

Quantifying the Re-identication Risk of Event Logs for Process Mining.
EMISA Forum, 2020

Bernoulli Meets PBFT: Modeling BFT Performance in the Presence of Dynamic Failures.
CoRR, 2020

Quantifying the Re-identification Risk of Event Logs for Process Mining.
CoRR, 2020

Privacy-Preserving Public Key Infrastructure for Vehicular Networks.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Managing Latency and Excess Data Dissemination in Fog-Based Publish/Subscribe Systems.
Proceedings of the 2020 IEEE International Conference on Fog Computing, 2020

IEEE S&B 2020: 4th IEEE Workshop on Security and Privacy on the Blockchain.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Every Query Counts: Analyzing the Privacy Loss of Exploratory Data Analyses.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

PredicTor: Predictive Congestion Control for the Tor Network.
Proceedings of the 2020 IEEE Conference on Control Technology and Applications, 2020

Quantifying the Re-identification Risk of Event Logs for Process Mining - Empiricial Evaluation Paper.
Proceedings of the Advanced Information Systems Engineering, 2020

Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks.
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020

2019
RRTxFM: Probabilistic Counting for Differentially Private Statistics.
IACR Cryptol. ePrint Arch., 2019

Kadcast: A Structured Approach to Broadcast in Blockchain Networks.
IACR Cryptol. ePrint Arch., 2019

Map-Z: Exposing the Zcash Network in Times of Transition.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

ICRC: Instant Certificate Revocation Checking using Blockchain-backed Bloom Filters.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

BBBlockchain: Blockchain-Based Participation in Urban Development.
Proceedings of the 15th International Conference on eScience, 2019

2018
P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations.
IACR Cryptol. ePrint Arch., 2018

Exploring Deployment Strategies for the Tor Network.
IACR Cryptol. ePrint Arch., 2018

CircuitStart: A Slow Start For Multi-Hop Anonymity Systems.
Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, 2018

Webchain: Verifiable Citations and References for the World Wide Web.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2017
Speed dating: A ferformance-enhancec rendezvous circuit for Tor.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Towards a Concurrent and Distributed Route Selection for Payment Channel Networks.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
Onions in the queue: an integral networking perspective on anonymous communication systems.
PhD thesis, 2016

ANOTEL: Cellular Networks with Location Privacy (Extended Version).
IACR Cryptol. ePrint Arch., 2016

Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies.
IEEE Commun. Surv. Tutorials, 2016

Mind the Gap: Towards a Backpressure-Based Transport Protocol for the Tor Network.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

ANOTEL: Cellular Networks with Location Privacy.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

2014
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Congestion Control for Routing Overlays.
Proceedings of the 8th Joint Workshop of the German Research Training Groups in Computer Science, 2014

2013
How (not) to build a transport layer for anonymity overlays.
SIGMETRICS Perform. Evaluation Rev., 2013

An algorithm for privacy-preserving distributed user statistics.
Comput. Networks, 2013

2011
Tor is unfair - And what to do about it.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

2010
Unleashing Tor, BitTorrent & Co.: How to relieve TCP deficiencies in overlays.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010


  Loading...