Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TRIDEnT: Building Decentralized Incentives for Collaborative Security., , , , and . CoRR, (2019)MCMix: Anonymous Messaging via Secure Multiparty Computation., , , and . USENIX Security Symposium, page 1217-1234. USENIX Association, (2017)How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes., , , , and . USENIX Security Symposium, page 359-376. USENIX Association, (2022)Who are Vulnerability Reporters?: A Large-scale Empirical Study on FLOSS., , , and . ESEM, page 25:1-25:12. ACM, (2021)Towards Secure Distributed Trust Management on a Global Scale: An analytical approach for applying Distributed Ledgers for authorization in the IoT., , and . IoT S&P@SIGCOMM, page 49-54. ACM, (2018)Assessing the Threat of Blockchain-based Botnets., , , , and . eCrime, page 1-11. IEEE, (2019)The Tip of the Iceberg: On the Merits of Finding Security Bugs., , , and . ACM Trans. Priv. Secur., 24 (1): 3:1-3:33 (2020)TRIDEnT: towards a decentralized threat indicator marketplace., , , , and . SAC, page 332-341. ACM, (2020)On enhancing trust in cryptographic solutions: student research abstract.. SAC, page 1848-1849. ACM, (2017)New Approaches to Software Security Metrics and Measurements.. Technical University of Darmstadt, Germany, (2022)