From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Designing Privacy-by-Design., , , , и . APF, том 8319 из Lecture Notes in Computer Science, стр. 55-72. Springer, (2012)Revocable Privacy: Principles, Use Cases, and Technologies., , и . APF, том 9484 из Lecture Notes in Computer Science, стр. 124-143. Springer, (2015)Practical Mutation Testing for Smart Contracts., , и . DPM/CBT@ESORICS, том 11737 из Lecture Notes in Computer Science, стр. 289-303. Springer, (2019)UbiKiMa: ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography., , и . Digital Identity Management, стр. 19-24. ACM, (2013)Balancing privacy and accountability in digital payment methods using zk-SNARKs., , и . PST, стр. 1-10. IEEE, (2022)Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks., , , , , , и . AISec@CCS, стр. 13-24. ACM, (2022)Vote to Link: Recovering from Misbehaving Anonymous Users., , и . WPES@CCS, стр. 111-122. ACM, (2016)Privacy-Preserving Verification of Clinical Research., , , , , , и . Sicherheit, том P-228 из LNI, стр. 481-500. GI, (2013)HeadPrint: detecting anomalous communications through header-based application fingerprinting., , , , , , , , и . SAC, стр. 1696-1705. ACM, (2020)Mobile Devices to the Identity Rescue., и . Privacy and Identity Management, том 421 из IFIP Advances in Information and Communication Technology, стр. 237-247. Springer, (2013)