Author of the publication

Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures.

, , and . USENIX Security Symposium, page 3415-3432. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Undercutting Bitcoin Is Not Profitable., , , and . CoRR, (2020)A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains., , , , , and . IACR Cryptol. ePrint Arch., (2024)A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains., , , , , and . CoRR, (2019)Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets., , , , and . CCS, page 3153-3167. ACM, (2023)Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms., , , , and . NDSS, The Internet Society, (2021)Scalable Off-Chain Auctions., , , , , , , , and . IACR Cryptol. ePrint Arch., (2023)"My Friend Wanted to Talk About It and I Didn't": Understanding Perceptions of Deletion Privacy in Social Platforms., , and . CoRR, (2020)Lethe: Conceal Content Deletion from Persistent Observers., , , , and . Proc. Priv. Enhancing Technol., 2019 (1): 206-226 (2019)Universal Payment Channels: An Interoperability Platform for Digital Currencies., , , , , , , , , and . CoRR, (2021)Expert key selection impact on the MANETs' performance using probabilistic key management algorithm., , , and . SIN, page 347-351. ACM, (2013)