Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting Security Vulnerabilities in Commercial Password Managers., and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 265-279. Springer, (2020)DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions., , , and . CoRR, (2019)Semidirect Product Key Exchange: the State of Play., , and . CoRR, (2022)Verifiable Classroom Voting in Practice., , , and . IEEE Secur. Priv., 16 (1): 72-81 (2018)End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead., , , , , , , , and . IACR Cryptol. ePrint Arch., (2020)A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem., , , and . IACR Cryptol. ePrint Arch., (2022)SEAL: Sealed-Bid Auction Without Auctioneers., , , and . IACR Cryptol. ePrint Arch., (2019)Battery draining attacks against edge computing nodes in IoT networks., , , , and . CoRR, (2020)Stealing PINs via mobile sensors: actual risk versus user perception., , , and . Int. J. Inf. Sec., 17 (3): 291-313 (2018)On the efficiency of a general attack against the MOBS cryptosystem., , , and . IACR Cryptol. ePrint Arch., (2021)