From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dynamic inference control.. DMKD, стр. 94-100. ACM, (2003)Public vs. Publicized: Content Use Trends and Privacy Expectations., и . HotSec, USENIX Association, (2011)Web-Based Inference Detection., , и . USENIX Security Symposium, USENIX Association, (2007)Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints., , , , и . CHI, стр. 354:1-354:20. ACM, (2024)"I had no idea this was a thing": on the importance of understanding the user experience of personalized transparency tools., и . STAST, стр. 79-86. ACM, (2016)"it's a generally exhausting field" A Large-Scale Study of Security Incident Management Workflows and Pain Points., и . PST, стр. 1-12. IEEE, (2019)Sanitization's slippery slope: the design and study of a text revision assistant., , и . SOUPS, ACM, (2009)Long-Lived Broadcast Encryption., , и . CRYPTO, том 1880 из Lecture Notes in Computer Science, стр. 333-352. Springer, (2000)Combinatorial Bounds for Broadcast Encryption., и . EUROCRYPT, том 1403 из Lecture Notes in Computer Science, стр. 512-526. Springer, (1998)Efficient Traitor Tracing Algorithms Using List Decoding., , и . ASIACRYPT, том 2248 из Lecture Notes in Computer Science, стр. 175-192. Springer, (2001)