Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collateral Damage of Facebook Applications: a Comprehensive Study., , , , , and . IACR Cryptology ePrint Archive, (2018)BArt: Trading digital contents through digital assets., and . Concurr. Comput. Pract. Exp., (2020)The Bitcoin P2P Network., , and . Financial Cryptography Workshops, volume 8438 of Lecture Notes in Computer Science, page 87-102. Springer, (2014)Improving Relational Classification Using Link Prediction Techniques., and . ECML/PKDD (1), volume 8188 of Lecture Notes in Computer Science, page 590-605. Springer, (2013)LockDown: Balance Availability Attack against Lightning Network Channels., , , , and . IACR Cryptol. ePrint Arch., (2019)Collateral damage of Facebook third-party applications: a comprehensive study., , , , , and . Comput. Secur., (2018)Classifying Online Social Network Users through the Social Graph., and . FPS, volume 7743 of Lecture Notes in Computer Science, page 115-131. Springer, (2012)Improving Automatic Edge Selection for Relational Classification., and . MDAI, volume 8234 of Lecture Notes in Computer Science, page 284-295. Springer, (2013)Collaborative Explanation of Deep Models with Limited Interaction for Trade Secret and Privacy Preservation., , and . WWW (Companion Volume), page 501-507. ACM, (2019)On Improving Automated Self-assessment with Moodle Quizzes: Experiences from a Cryptography Course., , and . TEA, volume 829 of Communications in Computer and Information Science, page 176-189. Springer, (2017)