Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Signaling: A Counter-Intuitive Defense Against Password Cracking., , and . CoRR, (2020)Cost-Asymmetric Memory Hard Password Hashing., , and . SCN, volume 13409 of Lecture Notes in Computer Science, page 21-44. Springer, (2022)Social-Aware Content Sharing in D2D Communications: An Optimal Stopping Approach., , , , and . ICC, page 1-6. IEEE, (2018)Optimal Data Traffic Pricing in Socially-Aware Network: A Game Theoretic Approach., , , , and . GLOBECOM, page 1-6. IEEE, (2016)Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models., , and . SP, page 626-644. IEEE, (2023)Research on the application of low-polygon design to Chinese chess: -Take the Chinese chess "knight" as an example., , and . WSSE, page 199-204. ACM, (2021)Compressed sensing based network tomography using end-to-end path measurements., , , , and . ICC, page 1-6. IEEE, (2017)Online Fair Allocation in Autonomous Vehicle Sharing., , , , and . GLOBECOM, page 1-6. IEEE, (2017)DAHash: Distribution Aware Tuning of Password Hashing Costs., and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 382-405. Springer, (2021)Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking., , and . GameSec, volume 13061 of Lecture Notes in Computer Science, page 334-353. Springer, (2021)