Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clockwork: Tracking Remote Timing Attacks., , , and . CSF, page 350-365. IEEE, (2020)Automatic Annotation of Confidential Data in Java Code., , , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 146-161. Springer, (2021)SecWasm: Information Flow Control for WebAssembly., , , and . SAS, volume 13790 of Lecture Notes in Computer Science, page 74-103. Springer, (2022)Securing IoT Apps., , and . IEEE Secur. Priv., 17 (5): 22-29 (2019)Prudent Design Principles for Information Flow Control., , and . PLAS@CCS, page 17-23. ACM, (2018)Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps., , and . NordSec, volume 11252 of Lecture Notes in Computer Science, page 19-37. Springer, (2018)