Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QuePaxa: Escaping the tyranny of timeouts in consensus., , , , , , and . SOSP, page 281-297. ACM, (2023)Continuous RFID-Enabled Authentication: Privacy Implications., , and . IEEE Technol. Soc. Mag., 30 (3): 34-41 (2011)CALYPSO: Private Data Management for Decentralized Ledgers., , , , , and . Proc. VLDB Endow., 14 (4): 586-599 (2020)Baxos: Backing off for Robust and Efficient Consensus., , , , , and . CoRR, (2022)Approaches and Issues in Location-Aware Continuous Authentication., and . CSE, page 279-283. IEEE Computer Society, (2010)Digital natives and mobile phones: A survey of practices and attitudes about privacy and security., and . ISTAS, page 441-449. IEEE, (2010)MoSS: Modular Security Specifications Framework., , , and . CRYPTO (3), volume 12827 of Lecture Notes in Computer Science, page 33-63. Springer, (2021)Monitoring of Electronic Communications at Universities: Policies and Perceptions of Privacy., and . HICSS, page 1-10. IEEE Computer Society, (2011)RFID-Based Authentication Middleware for Mobile Devices., , and . HICSS, page 1-10. IEEE Computer Society, (2010)Continuous RFID-enabled authentication and its privacy implications., , and . ISTAS, page 103-110. IEEE, (2010)