Author of the publication

18th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2014 Workshops BITCOIN and WAHC

, , , and (Eds.) 8438, Springer, (October 2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR., and . Proc. Priv. Enhancing Technol., 2020 (2): 481-498 (2020)Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition., and . EURASIP J. Inf. Secur., (2020)Strategic Vote Timing in Online Elections With Public Tallies., , and . CoRR, (2024)Mapping the Privacy Landscape for Central Bank Digital Currencies., , , and . Commun. ACM, 66 (3): 46-53 (March 2023)Information-Theoretic Bounds for the Forensic Detection of Downscaled Signals., and . IEEE Trans. Inf. Forensics Secur., 14 (7): 1928-1943 (2019)Not All Code are Create2 Equal., and . Financial Cryptography Workshops, volume 13412 of Lecture Notes in Computer Science, page 516-538. Springer, (2022)Mapping the Privacy Landscape for Central Bank Digital Currencies: Now is the time to shape what future payment flows will reveal about you., , , and . ACM Queue, 20 (4): 16-38 (2022)Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys., , , and . USENIX Security Symposium, page 2259-2273. USENIX Association, (2023)The Operational Cost of Ethereum Airdrops., and . DPM/CBT@ESORICS, volume 11737 of Lecture Notes in Computer Science, page 255-270. Springer, (2019)Know Your Library: How the libjpeg Version Influences Compression and Decompression Results., , and . IH&MMSec, page 19-25. ACM, (2022)