Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private Continual Release of Real-Valued Data Streams., , and . CoRR, (2018)Who Let theDOGSOut: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening., , , , and . DPM/CBT@ESORICS, volume 12484 of Lecture Notes in Computer Science, page 437-446. Springer, (2020)Use of cryptography in malware obfuscation., , , , , , and . J. Comput. Virol. Hacking Tech., 20 (1): 135-152 (2024)AC-PROT: An Access Control Model to Improve Software-Defined Networking Security., , , , and . VTC Spring, page 1-5. IEEE, (2017)Fast IDentity Online with Anonymous Credentials (FIDO-AC)., , , , and . USENIX Security Symposium, page 3029-3046. USENIX Association, (2023)Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study., , , and . SecDev, page 37-48. IEEE, (2023)Practical, Private Assurance of the Value of Collaboration., , , and . CoRR, (2023)Overlay routing using coordinate systems., , , and . CoNEXT, page 42. ACM, (2008)Private Continual Release of Real-Valued Data Streams., , and . NDSS, The Internet Society, (2019)A Blockchain-enabled Anonymous-yet- Traceable Distributed Key Generation., , , , and . Blockchain, page 257-265. IEEE, (2021)