Author of the publication

An Empirical Study & Evaluation of Modern CAPTCHAs.

, , , , , and . USENIX Security Symposium, page 3081-3097. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP., , , and . AsiaCCS, page 703-715. ACM, (2017)Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence., , and . CCS, page 1347-1361. ACM, (2023)On the TOCTOU Problem in Remote Attestation., , , and . CCS, page 2921-2936. ACM, (2021)An Empirical Study & Evaluation of Modern CAPTCHAs., , , , , and . USENIX Security Symposium, page 3081-3097. USENIX Association, (2023)V'CER: Efficient Certificate Validation in Constrained Networks., , , and . USENIX Security Symposium, page 4491-4508. USENIX Association, (2022)Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks., , and . COMPSAC (1), page 271-279. IEEE Computer Society, (2009)Simple and Flexible Revocation Checking with Privacy., and . Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science, page 351-367. Springer, (2006)Covert ephemeral communication in named data networking., , , and . AsiaCCS, page 15-26. ACM, (2014)Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation., , , and . WISEC, page 37-47. ACM, (2021)KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks., and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 598-615. Springer, (2018)