Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiparty Routing: Secure Routing for Mixnets., , , and . CoRR, (2017)Analyzing the Effectiveness of DoS Attacks on Tor., and . SIN, page 355. ACM, (2014)Overview of Polkadot and its Design Considerations., , , , , , , , , and 1 other author(s). IACR Cryptol. ePrint Arch., (2020)Accountable Light Client Systems for PoS Blockchains., , , and . IACR Cryptol. ePrint Arch., (2022)Collateral Damage of Facebook Applications: a Comprehensive Study., , , , , and . IACR Cryptology ePrint Archive, (2018)Bridging Sapling: Private Cross-Chain Transfers., , and . CoRR, (2022)Collateral damage of Facebook third-party applications: a comprehensive study., , , , , and . Comput. Secur., (2018)Tor Experimentation Tools., , and . IEEE Symposium on Security and Privacy Workshops, page 206-213. IEEE Computer Society, (2015)Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence., , , , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 194-208. Springer, (2016)Are health websites credible enough for elderly self-education in the most prevalent elderly diseases?, , , , and . BMC Medical Informatics Decis. Mak., 21 (1): 31 (2021)