Author of the publication

Mapping the Privacy Landscape for Central Bank Digital Currencies.

, , , and . Commun. ACM, 66 (3): 46-53 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR., and . Proc. Priv. Enhancing Technol., 2020 (2): 481-498 (2020)Mapping the Privacy Landscape for Central Bank Digital Currencies., , , and . Commun. ACM, 66 (3): 46-53 (March 2023)Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys., , , and . USENIX Security Symposium, page 2259-2273. USENIX Association, (2023)The Operational Cost of Ethereum Airdrops., and . DPM/CBT@ESORICS, volume 11737 of Lecture Notes in Computer Science, page 255-270. Springer, (2019)Know Your Library: How the libjpeg Version Influences Compression and Decompression Results., , and . IH&MMSec, page 19-25. ACM, (2022)Social Lending aus der Perspektive des Datenschutzes., and . Sicherheit, volume P-170 of LNI, page 317-328. GI, (2010)Not All Code are Create2 Equal., and . Financial Cryptography Workshops, volume 13412 of Lecture Notes in Computer Science, page 516-538. Springer, (2022)Forensics of High Quality and Nearly Identical JPEG Image Recompression., , , , and . IH&MMSec, page 11-21. ACM, (2016)Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security Implications., and . USENIX Security Symposium, USENIX Association, (2024)Statistical characterisation of MP3 encoders for steganalysis., and . MM&Sec, page 25-34. ACM, (2004)