Author of the publication

Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace

. CoRR, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatically Detecting Vulnerable Websites Before They Turn Malicious., and . USENIX Security Symposium, page 625-640. USENIX Association, (2014)Diversify to Survive: Making Passwords Stronger with Adaptive Policies., , , , , , , , , and . SOUPS, page 1-12. USENIX Association, (2017)"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab., , , , , , , and . SOUPS, page 123-140. USENIX Association, (2015)Adaptive Regret Minimization in Bounded-Memory Games, , , and . CoRR, (2011)A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers., , and . CoRR, (2016)Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking., , and . ACM Trans. Internet Techn., 18 (4): 54:1-54:19 (2018)Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You., , , , and . WEIS, (2015)Use Your Illusion: secure authentication usable anywhere., , , and . SOUPS, page 35-45. ACM, (2008)Exploring Usable Security to Improve the Impact of Formal Verification: A Research Agenda., , , and . AppFM@FM, volume 349 of EPTCS, page 77-84. (2021)Where are you taking me?Understanding Abusive Traffic Distribution Systems., , , , and . WWW, page 3613-3624. ACM / IW3C2, (2021)