Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism., , and . ACM Trans. Priv. Secur., 26 (4): 47:1-47:31 (November 2023)Classifying Unrooted Gaussian Trees under Privacy Constraints., , , and . CoRR, (2015)The Economics of Privacy and Utility: Investment Strategies., , and . IEEE Trans. Inf. Forensics Secur., (2024)An Extended Survey on Vehicle Security., , , and . CoRR, (2019)ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications., , and . IEEE Trans. Dependable Secur. Comput., 20 (5): 3636-3652 (September 2023)MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW., , , , and . TrustCom, page 425-433. IEEE, (2020)Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism., , and . ICC, page 1-7. IEEE, (2021)On the Secret Key Capacity of Sibling Hidden Markov Models., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (2): 514-524 (2019)RUMBA-Mouse: Rapid User Mouse-Behavior Authentication Using a CNN-RNN Approach., , , and . CNS, page 1-9. IEEE, (2020)An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol., , and . WISEC, page 144-153. ACM, (2018)