Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Automatically Penalizing Multimedia Breaches (Extended Abstract)., , , and . EuroS&P Workshops, page 340-346. IEEE, (2019)Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications., , , and . Proc. Priv. Enhancing Technol., 2022 (1): 396-416 (2022)Blockchain Access Privacy: Challenges and Directions., , and . IEEE Secur. Priv., 16 (4): 38-45 (2018)Last Mile of Blockchains: RPC and Node-as-a-service., , and . TPS-ISA, page 305-311. IEEE, (2022)The Danger of Small Anonymity Sets in Privacy-Preserving Payment Systems., , and . CoRR, (2022)Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification., , , , and . NDSS, The Internet Society, (2019)Finding Safety in Numbers with Secure Allegation Escrows., , , , and . NDSS, The Internet Society, (2020)Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures., , and . USENIX Security Symposium, page 3415-3432. USENIX Association, (2022)DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero., , , , , and . IACR Cryptol. ePrint Arch., (2019)Relax the Non-Collusion Assumption for Multi-Server PIR., , , and . CoRR, (2022)