Author of the publication

Detecting Token Systems on Ethereum.

, , and . Financial Cryptography, volume 11598 of Lecture Notes in Computer Science, page 93-112. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR., and . Proc. Priv. Enhancing Technol., 2020 (2): 481-498 (2020)Mapping the Privacy Landscape for Central Bank Digital Currencies., , , and . Commun. ACM, 66 (3): 46-53 (March 2023)Not All Code are Create2 Equal., and . Financial Cryptography Workshops, volume 13412 of Lecture Notes in Computer Science, page 516-538. Springer, (2022)Social Lending aus der Perspektive des Datenschutzes., and . Sicherheit, volume P-170 of LNI, page 317-328. GI, (2010)Forensics of High Quality and Nearly Identical JPEG Image Recompression., , , , and . IH&MMSec, page 11-21. ACM, (2016)Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys., , , and . USENIX Security Symposium, page 2259-2273. USENIX Association, (2023)The Operational Cost of Ethereum Airdrops., and . DPM/CBT@ESORICS, volume 11737 of Lecture Notes in Computer Science, page 255-270. Springer, (2019)Know Your Library: How the libjpeg Version Influences Compression and Decompression Results., , and . IH&MMSec, page 19-25. ACM, (2022)Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR., and . CoRR, (2019)Conformity or Diversity: Social Implications of Transparency in Personal Data Processing.. Managing Information Risk and the Economics of Security, Springer, (2009)