Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Tor using a TCP-over-DTLS Tunnel., and . USENIX Security Symposium, page 119-134. USENIX Association, (2009)Dynamically Regulating Mobile Application Permissions., , , , , , and . IEEE Secur. Priv., 16 (1): 64-71 (2018)User-level secure deletion on log-structured file systems., , , and . AsiaCCS, page 63-64. ACM, (2012)Applying Private Information Retrieval to Lightweight Bitcoin Clients., , , and . CoRR, (2020)The Price is (Not) Right: Comparing Privacy in Free and Paid Apps., , , , , , , , and . Proc. Priv. Enhancing Technol., 2020 (3): 222-242 (2020)Proximity Tracing in an Ecosystem of Surveillance Capitalism., and . WPES@CCS, page 191-203. ACM, (2020)Secure data deletion from persistent media., , , and . ACM Conference on Computer and Communications Security, page 271-284. ACM, (2013)Contextualizing Privacy Decisions for Better Prediction (and Protection)., , , , , , , , and . CHI, page 268. ACM, (2018)50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System., , , , , and . USENIX Security Symposium, page 603-620. USENIX Association, (2019)Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory., , and . USENIX Security Symposium, page 333-348. USENIX Association, (2012)