Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forgery Quality and Its Implications for Behavioral Biometric Security., , and . IEEE Trans. Syst. Man Cybern. Part B, 37 (5): 1107-1118 (2007)Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations., , , , and . SP, page 35-49. IEEE Computer Society, (2008)Tick Tock: Building Browser Red Pills from Timing Side Channels., , , and . WOOT, USENIX Association, (2014)CAMP: Content-Agnostic Malware Protection., , , , and . NDSS, The Internet Society, (2013)Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?, , , and . USENIX Security Symposium, USENIX Association, (2007)The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution., , , , and . LEET, USENIX Association, (2010)An Extensible Platform for Evaluating Security Protocols., , , , and . Annual Simulation Symposium, page 204-213. IEEE Computer Society, (2005)Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension., , , , , , , and . WWW, page 1009-1019. ACM, (2016)The Practical Subtleties of Biometric Key Generation., , and . USENIX Security Symposium, page 61-74. USENIX Association, (2008)Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing., , and . USENIX Security Symposium, USENIX Association, (2006)