Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Don't Talk to Strangers - On the Challenges of Intelligent Vehicle Authentication., and . VEHITS, page 522-528. SciTePress, (2018)Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage., , , , and . USENIX Security Symposium, page 655-672. USENIX Association, (2016)Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers., , and . NDSS, The Internet Society, (2019)Charm: A Framework for Rapidly Prototyping Cryptosystems., , and . NDSS, The Internet Society, (2012)A Protocol for Privately Reporting Ad Impressions at Scale., , and . ACM Conference on Computer and Communications Security, page 1591-1601. ACM, (2016)Fluid MPC: Secure Multiparty Computation with Dynamic Participants., , , , and . CRYPTO (2), volume 12826 of Lecture Notes in Computer Science, page 94-123. Springer, (2021)Blogging birds: Generating narratives about reintroduced species to promote public engagement., , , , and . INLG, page 120-124. The Association for Computer Linguistics, (2012)Downgrade Resilience in Key-Exchange Protocols., , , , , and . IEEE Symposium on Security and Privacy, page 506-525. IEEE Computer Society, (2016)Security Analysis of a Cryptographically-Enabled RFID Device., , , , , and . USENIX Security Symposium, USENIX Association, (2005)Charm: A framework for Rapidly Prototyping Cryptosystems., , and . IACR Cryptology ePrint Archive, (2011)