Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algebraic Attacks on Human Identification Protocols., , , , and . IACR Cryptology ePrint Archive, (2014)A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated., , and . CoRR, (2018)Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms., and . Proc. Priv. Enhancing Technol., 2020 (2): 358-378 (2020)DDoD: Dual Denial of Decision Attacks on Human-AI Teams., , , , , , , and . IEEE Pervasive Comput., 22 (1): 77-84 (2023)Who Let theDOGSOut: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening., , , , and . DPM/CBT@ESORICS, volume 12484 of Lecture Notes in Computer Science, page 437-446. Springer, (2020)Use of cryptography in malware obfuscation., , , , , , and . J. Comput. Virol. Hacking Tech., 20 (1): 135-152 (2024)Private Continual Release of Real-Valued Data Streams., , and . CoRR, (2018)Averaging Attacks on Bounded Perturbation Algorithms., and . CoRR, (2019)The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services., , , , , , , and . Proc. Priv. Enhancing Technol., 2021 (1): 209-228 (2021)Differentially Private Data Generative Models., , , , , , and . CoRR, (2018)