Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel Method to Watermark Anonymized Data for Data Publishing., , and . IEICE Trans. Inf. Syst., 100-D (8): 1671-1679 (2017)CTR: Checkpoint, Transfer, and Restore for Secure Enclaves., , , , and . CoRR, (2022)CACTI: Captcha Avoidance via Client-side TEE Integration., , , and . USENIX Security Symposium, page 2561-2578. USENIX Association, (2021)VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests., , , , and . CoRR, (2021)CACTI: Captcha Avoidance via Client-side TEE Integration., , , and . CoRR, (2020)Vronicle: A System for Producing Videos with Verifiable Provenance., , , , and . CoRR, (2021)FROG: A Packet Hop Count based DDoS Countermeasure in NDN., , and . ISCC, page 492-497. IEEE, (2018)VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests., , , , and . NDSS, The Internet Society, (2023)Puppy: A Publicly Verifiable Watermarking Protocol., , , , and . CoRR, (2023)An Empirical Study & Evaluation of Modern CAPTCHAs., , , , , and . USENIX Security Symposium, page 3081-3097. USENIX Association, (2023)