Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms., , and . ISC, volume 7001 of Lecture Notes in Computer Science, page 197-212. Springer, (2011)Protecting Insecure Communications with Topology-aware Network Tunnels., and . ACM Conference on Computer and Communications Security, page 1280-1291. ACM, (2016)SAuth: protecting user accounts from password database leaks., , , and . ACM Conference on Computer and Communications Security, page 187-198. ACM, (2013)Reducing Third Parties in the Network through Client-Side Intelligence.. Columbia University, USA, (2018)CAPTCHuring Automated (Smart)Phone Attacks., , and . EC2ND, page 60. IEEE Computer Society, (2011)Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access., , and . CoRR, (2018)Using social networks to harvest email addresses., , , , , and . WPES, page 11-20. ACM, (2010)All your face are belong to us: breaking Facebook's social authentication., , , , , , and . ACSAC, page 399-408. ACM, (2012)we.b: the web of short urls, , , , , , and . Proceedings of the 20th international conference on World wide web, ACM Press, (2011)Dynamic Monitoring of Dark IP Address Space (Poster)., , , and . TMA, volume 6613 of Lecture Notes in Computer Science, page 193-196. Springer, (2011)