Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private Continual Release of Real-Valued Data Streams., , and . CoRR, (2018)A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm., , and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 349-366. (2010)Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories., , , , and . ACNS (1), volume 13905 of Lecture Notes in Computer Science, page 284-308. Springer, (2023)A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists., , , , , and . AsiaCCS, page 193-205. ACM, (2019)Practical, Private Assurance of the Value of Collaboration., , , and . CoRR, (2023)On the Resilience of Biometric Authentication Systems against Random Inputs., , and . NDSS, The Internet Society, (2020)Privacy Preserving Release of Mobile Sensor Data., , , , , and . ARES, page 5:1-5:13. ACM, (2024)Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model., , and . IACR Cryptol. ePrint Arch., (2024)A Subexponential Construction of Graph Coloring for Multiparty Computation., , , and . IACR Cryptology ePrint Archive, (2014)POSTER: TouchTrack: How Unique are your Touch Gestures?, , , and . CCS, page 2555-2557. ACM, (2017)