Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Cryptography Against Compelled Self-Incrimination., and . IACR Cryptol. ePrint Arch., (2020)Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies., , , , , and . STAST, volume 11739 of Lecture Notes in Computer Science, page 175-186. Springer, (2019)From Soft Classifiers to Hard Decisions: How fair can we be?, , , , , and . FAT, page 309-318. ACM, (2019)Group Moderation Under End-to-End Encryption., and . CSLAW, page 36-47. ACM, (2024)From Soft Classifiers to Hard Decisions: How fair can we be?, , , , , and . CoRR, (2018)Arithmetic Expression Construction., , , , , , , , , and 3 other author(s). ISAAC, volume 181 of LIPIcs, page 12:1-12:15. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Public Verification for Private Hash Matching., , and . SP, page 253-273. IEEE, (2023)BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits., , and . Financial Cryptography (1), volume 12674 of Lecture Notes in Computer Science, page 476-496. Springer, (2021)PSPACE-completeness of Pulling Blocks to Reach a Goal., , , , , , , and . J. Inf. Process., (2020)Decrypting legal dilemmas. Boston University, USA, (2021)