Author of the publication

Orca: Blocklisting in Sender-Anonymous Messaging.

, , , and . USENIX Security Symposium, page 2299-2316. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Message Franking: From Invisible Salamanders to Encryptment., , , and . IACR Cryptology ePrint Archive, (2019)Honey Encryption: Encryption beyond the Brute-Force Barrier., and . IEEE Secur. Priv., 12 (4): 59-62 (2014)Characterizing Twitter Users Who Engage in Adversarial Interactions against Political Candidates., , and . CHI, page 1-13. ACM, (2020)A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19., , , , and . CHI, page 71:1-71:17. ACM, (2021)Account Security Interfaces: Important, Unintuitive, and Untrustworthy., , , , and . USENIX Security Symposium, page 3601-3618. USENIX Association, (2023)Partitioning Oracle Attacks., , and . USENIX Security Symposium, page 195-212. USENIX Association, (2021)Increasing Adversarial Uncertainty to Scale Private Similarity Testing., , , , and . USENIX Security Symposium, page 1777-1794. USENIX Association, (2022)"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence., , , , , , and . Proc. ACM Hum. Comput. Interact., 3 (CSCW): 202:1-202:24 (2019)Guarding Serverless Applications with SecLambda., , , , and . CoRR, (2020)Care Infrastructures for Digital Security in Intimate Partner Violence., , , , , and . CHI, page 123:1-123:20. ACM, (2022)