Author of the publication

On the Content Security Policy Violations due to the Same-Origin Policy.

, , and . WWW, page 877-886. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dark Patterns and the Legal Requirements of Consent Banners: An Interaction Criticism Perspective., , , , and . CoRR, (2020)Feedback to the European Data Protection Board's Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive., , , , , , and . CoRR, (2024)Protecting Privacy of Web Users. (Protection de la vie privée des internautes).. (2021)Security Analysis of Subject Access Request Procedures - How to Authenticate Data Subjects Safely When They Request for Their Data., , , , and . APF, volume 11498 of Lecture Notes in Computer Science, page 182-209. Springer, (2019)Hybrid Monitoring of Attacker Knowledge., , and . CSF, page 225-238. IEEE Computer Society, (2016)Predictability of Enforcement., and . ESSoS, volume 6542 of Lecture Notes in Computer Science, page 73-86. Springer, (2011)Online Privacy and Web Transparency (Dagstuhl Seminar 17162)., , , and . Dagstuhl Reports, 7 (4): 83-106 (2017)An Ontology of Dark Patterns Knowledge: Foundations, Definitions, and a Pathway for Shared Knowledge-Building., , , and . CoRR, (2023)Iterative enforcement by suppression: Towards practical enforcement theories., and . J. Comput. Secur., 20 (1): 51-79 (2012)Web Tracking Technologies and Protection Mechanisms.. CCS, page 2607-2609. ACM, (2017)