From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Interdependent Privacy: Let Me Share Your Data., и . Financial Cryptography, том 7859 из Lecture Notes in Computer Science, стр. 338-353. Springer, (2013)Colonel Blotto in the Phishing War., и . GameSec, том 7037 из Lecture Notes in Computer Science, стр. 201-218. Springer, (2011)KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale., , , , , , , и . IEEE Symposium on Security and Privacy, стр. 350-364. IEEE, (2019)Use of Ratings from Personalized Communities for Trustworthy Application Installation., , и . NordSec, том 7127 из Lecture Notes in Computer Science, стр. 71-88. Springer, (2010)Certification Intermediaries and the Alternative (Poster).. Financial Cryptography, том 6052 из Lecture Notes in Computer Science, стр. 425. Springer, (2010)Community-based web security: complementary roles of the serious and casual contributors., и . CSCW, стр. 1023-1032. ACM, (2012)Is this app safe?: a large scale study on application permissions and risk signals., , и . WWW, стр. 311-320. ACM, (2012)Does Trust Matter for User Preferences? A Study on Epinions Ratings., и . IFIPTM, том 321 из IFIP Advances in Information and Communication Technology, стр. 232-247. Springer, (2010)Analyzing the Gold Star Scheme in a Split Tor Network., , и . SecureComm, том 96 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 77-95. Springer, (2011)Analyzing the incentives in Community-based Security Systems.. PerCom Workshops, стр. 270-275. IEEE Computer Society, (2011)