Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems., , and . CoRR, (2019)Traffic Analysis Attacks on a Continuously-Observable Steganographic File System, , , and . Proceedings of Information Hiding Workshop (IH 2007), volume 4567 of Lecture Notes in Computer Science, page 220--236. Saint-Malo,FR, Springer-Verlag, (2007)Bayesian inference to evaluate information leakage in complex scenarios.. IH&MMSec, page 1-2. ACM, (2013)Helium: Scalable MPC among Lightweight Participants and under Churn., , , and . IACR Cryptol. ePrint Arch., (2024)CookieGraph: Understanding and Detecting First-Party Tracking Cookies., , , , , and . CCS, page 3490-3504. ACM, (2023)On the (In)security of Peer-to-Peer Decentralized Machine Learning., , and . SP, page 418-436. IEEE, (2023)Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign., , and . CoRR, (2020)Decentralized Privacy-Preserving Proximity Tracing., , , , , , , , , and 24 other author(s). CoRR, (2020)The Fundamental Limits of Least-Privilege Learning., , , , and . CoRR, (2024)On the Conflict of Robustness and Learning in Collaborative Machine Learning., and . CoRR, (2024)