Author of the publication

A Learning-Based Approach to Reactive Security.

, , , , , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 192-206. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust defenses for cross-site request forgery., , and . CCS, page 75-88. ACM, (2008)Beware of Finer-Grained Origins, and . Proceedings of Web 2.0 Security and Privacy Workshop 2008, (2008)Browser Security: Lessons from Google Chrome., , and . ACM Queue, 7 (5): 3 (2009)Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves., , and . SP, page 360-371. IEEE Computer Society, (2009)Protecting browsers from dns rebinding attacks., , , , and . ACM Conference on Computer and Communications Security, page 421-431. ACM, (2007)Design and analysis of privacy policies.. Stanford University, USA, (2008)Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense., , and . USENIX Security Symposium, page 187-198. USENIX Association, (2009)Forcehttps: protecting high-security web sites from network attacks., and . WWW, page 525-534. ACM, (2008)A Learning-Based Approach to Reactive Security., , , , , and . IEEE Trans. Dependable Secur. Comput., 9 (4): 482-493 (2012)Securing Frame Communication in Browsers., , and . USENIX Security Symposium, page 17-30. USENIX Association, (2008)