Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revocable Privacy: Principles, Use Cases, and Technologies., , and . APF, volume 9484 of Lecture Notes in Computer Science, page 124-143. Springer, (2015)Designated Attribute-Based Proofs for RFID Applications., , and . RFIDSec, volume 7739 of Lecture Notes in Computer Science, page 59-75. Springer, (2012)Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications., , , , , , , , , and . Frontiers Digit. Health, (2021)DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists., , , , , , , and . USENIX Security Symposium, page 1911-1927. USENIX Association, (2020)Deploying decentralized, privacy-preserving proximity tracing., , , , , , , , , and 7 other author(s). Commun. ACM, 65 (9): 48-57 (2022)19th Workshop on Privacy in the Electronic Society (WPES 2020)., and . ACM Conference on Computer and Communications Security, page 2141-2142. ACM, (2020)On Linkability and Malleability in Self-blindable Credentials., , and . WISTP, volume 9311 of Lecture Notes in Computer Science, page 203-218. Springer, (2015)An Attack Against Fixed Value Discrete Logarithm Representations., , and . IACR Cryptology ePrint Archive, (2013)Vote to Link: Recovering from Misbehaving Anonymous Users., , and . WPES@CCS, page 111-122. ACM, (2016)Private Collection Matching Protocols., , , and . Proc. Priv. Enhancing Technol., 2023 (3): 446-468 (July 2023)