Author of the publication

An open design privacy-enhancing platform supporting location-based applications.

, , , and . ICUIMC, page 59:1-59:10. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RAMenPaSTA: Parallelizable Scalable Transparent Arguments of Knowledge for RAM Programs., , and . IACR Cryptol. ePrint Arch., (2024)An open design privacy-enhancing platform supporting location-based applications., , , and . ICUIMC, page 59:1-59:10. ACM, (2012)The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations (Transcript of Discussion).. Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 180-185. Springer, (2017)The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations., , , , and . Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 171-179. Springer, (2017)FuturesMEX: Secure, Distributed Futures Market Exchange., , , , and . IEEE Symposium on Security and Privacy, page 335-353. IEEE Computer Society, (2018)Distributed Financial Exchanges: Security Challenges and Design Principles., and . IEEE Secur. Priv., 19 (1): 54-64 (2021)Blockchain-based Invoice Factoring: from business requirements to commitments., , , and . DLT@ITASEC, volume 2334 of CEUR Workshop Proceedings, page 17-31. CEUR-WS.org, (2019)Vision: What If They All Die? Crypto Requirements For Key People., , , , and . EuroS&P Workshops, page 178-183. IEEE, (2020)Are You a Favorite Target For Cryptojacking? A Case-Control Study On The Cryptojacking Ecosystem., and . EuroS&P Workshops, page 515-520. IEEE, (2020)Non-monotonic Security Protocols and Failures in Financial Intermediation., , , and . Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 45-54. Springer, (2018)