Fatemeh Shirazi
Fatemeh Shirazi
Acting CTO & Research Team Lead at Web3 Foundation
Verified email at web3.foundation - Homepage
Title
Cited by
Cited by
Year
A survey on routing in anonymous communication protocols
F Shirazi, M Simeonovski, MR Asghar, M Backes, C Diaz
ACM Computing Surveys (CSUR) 51 (3), 39, 2018
512018
A Survey on Tor and I2P
B Conrad, F Shirazi
International Conference on Internet Monitoring and Protection – ICIMP '14 9 …, 2014
282014
What Deters Jane from Preventing Identification and Tracking on the Web?
F Shirazi, M Volkamer
Workshop on Privacy in the Electronic Society – WPES '14 13, 107--116, 2014
272014
Internet Privacy: Options for adequate realisation
J Buchmann, R Capurro, M Löw, G Müller, A Pretschner, A Roßnagel, ...
Springer Science & Business Media, 2014
222014
Tor Experimentation Tools
F Shirazi, M Goehring, C Diaz
International Workshop on Privacy Engineering – IWPE '15 1, 206 - 213, 2015
202015
Internet Privacy: Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis
J Buchmann, R Capurro, M Löw, G Müller, A Pretschner, A Roßnagel, ...
Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis, 2012
202012
Collateral damage of Facebook third-party applications: a comprehensive study
I Symeonidis, G Biczók, F Shirazi, C Pérez-Solà, J Schroers, B Preneel
Computers & Security 77, 179-208, 2018
192018
Towards measuring resilience in anonymous communication networks
F Shirazi, C Diaz, J Wright
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 95-99, 2015
182015
Towards Measuring Resilience in Anonymous Communication Networks
F Shirazi, C Diaz, C Mullan, J Wright, J Buchmann
6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013), 9, 2013
182013
Robust electronic voting: Introducing robustness in civitas
F Shirazi, S Neumann, I Ciolacu, M Volkamer
Workshop on Requirements Engineering for Electronic Voting Systems – REVOTE …, 2011
182011
Personal Information Dashboard: Putting the Individual Back in Control
J Buchmann, M Nebel, A Rossnagel, F Shirazi, H Simo, M Waidner
Digital Enlightenment Yearbook 2013: The Value of Personal Data, 139-164, 2013
162013
Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence.
I Symeonidis, F Shirazi, G Biczok, C Perez-Sola, B Preneel
In the Proceedings of the International Conference on ICT Systems Security …, 2016
122016
State of online privacy: A technical perspective
F Kelbert, F Shirazi, H Simo, T Wüchner, J Buchmann, A Pretschner, ...
Internet Privacy, 189-279, 2012
82012
Overview of polkadot and its design considerations
J Burdges, A Cevallos, P Czaban, R Habermeier, S Hosseini, F Lama, ...
arXiv preprint arXiv:2005.13456, 2020
52020
Analyzing the Effectiveness of DOS Attacks on Tor
B Conrad, F Shirazi
Conference on Security of Information and Networks – SIN '14, 355, 2014
42014
Multiparty routing: Secure routing for mixnets
F Shirazi, E Andreeva, M Kohlweiss, C Diaz
arXiv preprint arXiv:1708.03387, 2017
22017
Internet Privacy: Taking Opportunities, Assessing Risks, Building Trust (acatech Position)
J Buchmann, R Capurro, M Löw, G Müller, A Pretschner, A Roßnagel, ...
acatech Position, 34, 2013
2*2013
The system can't perform the operation now. Try again later.
Articles 1–17