Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces., and . CoRR, (2018)An Interface Between Legacy and Modern Mobile Devices for Digital Identity., , and . ETAA, volume 13136 of Lecture Notes in Computer Science, page 68-76. Springer, (2021)On the Privacy and Security of the Ultrasound Ecosystem., , , , , and . Proc. Priv. Enhancing Technol., 2017 (2): 95-112 (2017)Towards Low-level Cryptographic Primitives for JavaCards., and . CoRR, (2018)Market Manipulation as a Security Problem: Attacks and Defenses.. EuroSec@EuroSys, page 1:1-1:6. ACM, (2019)Nearest Neighbour with Bandit Feedback., , and . CoRR, (2023)SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing Countries., , and . STM, volume 13867 of Lecture Notes in Computer Science, page 3-23. Springer, (2022)Inroads into Autonomous Network Defence using Explained Reinforcement Learning., , , , and . CAMLIS, volume 3391 of CEUR Workshop Proceedings, page 1-19. CEUR-WS.org, (2022)JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets., and . EuroS&P Workshops, page 89-96. IEEE, (2020)Adaptive Webpage Fingerprinting from TLS Traces., and . DSN, page 445-458. IEEE, (2023)