Author of the publication

Where's Wally?: Precise User Discovery Attacks in Location Proximity Services.

, , , , and . ACM Conference on Computer and Communications Security, page 817-828. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tug-of-War: Observations on Unified Content Handling., , , , , and . CoRR, (2017)DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System., , and . RFC, (March 2000)Transport Layer Security (TLS) Authorization Using KeyNote.. RFC, (October 2010)The dual receiver cryptosystem and its applications., , , and . CCS, page 330-343. ACM, (2004)Efficient, DoS-resistant, secure key exchange for internet protocols., , , , , , and . ACM Conference on Computer and Communications Security, page 48-58. ACM, (2002)Detection and analysis of eavesdropping in anonymous communication networks., , , and . Int. J. Inf. Sec., 14 (3): 205-220 (2015)Execution transactions for defending against software failures: use and evaluation., and . Int. J. Inf. Sec., 5 (2): 77-91 (2006)How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints., , , and . ACM Trans. Priv. Secur., 19 (1): 2:1-2:31 (2016)Secure quality of service handling: SQoSH., , , , and . IEEE Commun. Mag., 38 (4): 106-112 (2000)IntFlow: improving the accuracy of arithmetic error detection using information flow tracking., , , , and . ACSAC, page 416-425. ACM, (2014)