Author of the publication

NoCry: No More Secure Encryption Keys for Cryptographic Ransomware.

, , and . ETAA@ESORICS, volume 11967 of Lecture Notes in Computer Science, page 69-85. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols., , , and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 86-99. Springer, (2003)"I am Definitely Manipulated, Even When I am Aware of it. It's Ridiculous!" - Dark Patterns from the End-User Perspective., , , , , and . Conference on Designing Interactive Systems, page 763-776. ACM, (2021)Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems., , and . STM, volume 9871 of Lecture Notes in Computer Science, page 170-178. Springer, (2016)Patient-Centred Transparency Requirements for Medical Data Sharing Systems., and . WorldCIST (1), volume 444 of Advances in Intelligent Systems and Computing, page 1073-1083. Springer, (2016)A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption., , , , and . AFRICACRYPT, volume 13503 of Lecture Notes in Computer Science, page 425-447. Springer Nature Switzerland, (2022)What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP., , , and . ACSAC, page 385-398. ACM, (2021)Accomplishing Transparency within the General Data Protection Regulation., , and . ICISSP, page 114-125. SciTePress, (2019)Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare., and . ICISSP, page 63-73. SciTePress, (2016)"I personally relate it to the traffic light": a user study on security & privacy indicators in a secure email system committed to privacy by default., , and . SAC, page 1235-1246. ACM, (2021)Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking., , and . SVV@ICLP, volume 118 of Electronic Notes in Theoretical Computer Science, page 57-70. Elsevier, (2003)