Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bayesian inference to evaluate information leakage in complex scenarios.. IH&MMSec, page 1-2. ACM, (2013)Traffic Analysis Attacks on a Continuously-Observable Steganographic File System, , , and . Proceedings of Information Hiding Workshop (IH 2007), volume 4567 of Lecture Notes in Computer Science, page 220--236. Saint-Malo,FR, Springer-Verlag, (2007)A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems., , and . CoRR, (2019)Helium: Scalable MPC among Lightweight Participants and under Churn., , , and . IACR Cryptol. ePrint Arch., (2024)CookieGraph: Understanding and Detecting First-Party Tracking Cookies., , , , , and . CCS, page 3490-3504. ACM, (2023)On the (In)security of Peer-to-Peer Decentralized Machine Learning., , and . SP, page 418-436. IEEE, (2023)Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign., , and . CoRR, (2020)Synthetic Data - A Privacy Mirage., , and . CoRR, (2020)Under the Hood of Membership Inference Attacks on Aggregate Location Time-Series., , and . CoRR, (2019)CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing., , , , , , and . Proc. Priv. Enhancing Technol., 2021 (4): 350-368 (2021)