Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revocable Privacy: Principles, Use Cases, and Technologies., , and . APF, volume 9484 of Lecture Notes in Computer Science, page 124-143. Springer, (2015)Designated Attribute-Based Proofs for RFID Applications., , and . RFIDSec, volume 7739 of Lecture Notes in Computer Science, page 59-75. Springer, (2012)Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications., , , , , , , , , and . Frontiers Digit. Health, (2021)Deploying decentralized, privacy-preserving proximity tracing., , , , , , , , , and 7 other author(s). Commun. ACM, 65 (9): 48-57 (2022)DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists., , , , , , , and . USENIX Security Symposium, page 1911-1927. USENIX Association, (2020)19th Workshop on Privacy in the Electronic Society (WPES 2020)., and . ACM Conference on Computer and Communications Security, page 2141-2142. ACM, (2020)Vote to Link: Recovering from Misbehaving Anonymous Users., , and . WPES@CCS, page 111-122. ACM, (2016)An Attack Against Fixed Value Discrete Logarithm Representations., , and . IACR Cryptology ePrint Archive, (2013)Reducing Metadata Leakage from Encrypted Files and Communication with PURBs., , , , , and . Proc. Priv. Enhancing Technol., 2019 (4): 6-33 (2019)Private Collection Matching Protocols., , , and . Proc. Priv. Enhancing Technol., 2023 (3): 446-468 (July 2023)