Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unnecessary Input Heuristics and PayJoin Transactions., , , , and . HCI (38), volume 1420 of Communications in Computer and Information Science, page 416-424. Springer, (2021)Analyzing UTXO-Based Blockchain Privacy Threats., , and . IACR Cryptol. ePrint Arch., (2023)Bitcoin Privacy - A Survey on Mixing Techniques., , and . IACR Cryptol. ePrint Arch., (2021)Usability of Cryptocurrency Wallets Providing CoinJoin Transactions., , and . IACR Cryptol. ePrint Arch., (2022)Studying Bitcoin Privacy Attacks and Their Impact on Bitcoin-Based Identity Methods., , and . BPM (Blockchain and RPA Forum), volume 428 of Lecture Notes in Business Information Processing, page 85-101. Springer, (2021)A 2-level model for e-commerce security., , and . WorldCIS, page 263-268. IEEE, (2011)Unnecessary Input Heuristics & PayJoin Transactions., , , , and . IACR Cryptol. ePrint Arch., (2022)SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques., , and . ARES, page 5:1-5:14. ACM, (2022)User-Perceived Privacy in Blockchain., , and . Financial Cryptography Workshops, volume 13412 of Lecture Notes in Computer Science, page 164-194. Springer, (2022)