Author of the publication

Napster Opens Pandora's Box: Examining How File-Sharing Services Threaten the Enforcement of Copyright on the Internet

. Ohio State Law Journal, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Don't Talk to Strangers - On the Challenges of Intelligent Vehicle Authentication., and . VEHITS, page 522-528. SciTePress, (2018)A Protocol for Privately Reporting Ad Impressions at Scale., , and . ACM Conference on Computer and Communications Security, page 1591-1601. ACM, (2016)Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage., , , , and . USENIX Security Symposium, page 655-672. USENIX Association, (2016)Charm: A Framework for Rapidly Prototyping Cryptosystems., , and . NDSS, The Internet Society, (2012)Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers., , and . NDSS, The Internet Society, (2019)Downgrade Resilience in Key-Exchange Protocols., , , , , and . IEEE Symposium on Security and Privacy, page 506-525. IEEE Computer Society, (2016)Blogging birds: Generating narratives about reintroduced species to promote public engagement., , , , and . INLG, page 120-124. The Association for Computer Linguistics, (2012)Fluid MPC: Secure Multiparty Computation with Dynamic Participants., , , , and . CRYPTO (2), volume 12826 of Lecture Notes in Computer Science, page 94-123. Springer, (2021)SoK: Cryptographic Confidentiality of Data on Mobile Devices., , and . Proc. Priv. Enhancing Technol., 2022 (1): 586-607 (2022)Developers Are Users Too: Designing Crypto and Security APIs That Busy Engineers and Sysadmins Can Use Securely, and . (August 2015)