Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JoBS: Joint Buffer Management and Scheduling for Differentiated Services., and . IWQoS, volume 2092 of Lecture Notes in Computer Science, page 404-418. Springer, (2001)Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment., , and . USENIX Security Symposium, page 5199-5216. USENIX Association, (2023)A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior., , , , , , , , , and . CHI, page 2903-2912. ACM, (2015)Self-Supervised Euphemism Detection and Identification for Content Moderation., , , , , , and . SP, page 229-246. IEEE, (2021)ICLab: A Global, Longitudinal Internet Censorship Measurement Platform., , , , , , and . SP, page 135-151. IEEE, (2020)Email typosquatting., and . Internet Measurement Conference, page 419-431. ACM, (2017)Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements., , , and . CCS, page 1407-1426. ACM, (2020)Moving Forward, Building an Ethics Community (Panel Statements)., , , and . Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, page 178-183. Springer, (2011)This is your data on drugs: lessons computer security can learn from the drug war., , and . NSPW, page 143-149. ACM, (2010)Empirically Measuring WHOIS Misuse., and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 19-36. Springer, (2014)