Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Automatically Penalizing Multimedia Breaches (Extended Abstract)., , , and . EuroS&P Workshops, page 340-346. IEEE, (2019)Blockchain Access Privacy: Challenges and Directions., , and . IEEE Secur. Priv., 16 (4): 38-45 (2018)Relax the Non-Collusion Assumption for Multi-Server PIR., , , and . CoRR, (2022)The Danger of Small Anonymity Sets in Privacy-Preserving Payment Systems., , and . CoRR, (2022)Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications., , , and . Proc. Priv. Enhancing Technol., 2022 (1): 396-416 (2022)DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero., , , , , and . IACR Cryptol. ePrint Arch., (2019)Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification., , , , and . NDSS, The Internet Society, (2019)Finding Safety in Numbers with Secure Allegation Escrows., , , , and . NDSS, The Internet Society, (2020)Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures., , and . USENIX Security Symposium, page 3415-3432. USENIX Association, (2022)Last Mile of Blockchains: RPC and Node-as-a-service., , and . TPS-ISA, page 305-311. IEEE, (2022)