From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites., , , , , , и . PACMHCI, 3 (CSCW): 81:1-81:32 (2019)What Happened to the Crypto Dream?, Part 2.. IEEE Secur. Priv., 11 (3): 68-71 (2013)A Critical Look at Decentralized Personal Data Architectures, , , , и . CoRR, (2012)Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States., и . eCrime, стр. 1-17. IEEE, (2021)Obfuscated databases and group privacy., и . CCS, стр. 102-111. ACM, (2005)Cookies That Give You Away: The Surveillance Implications of Web Tracking., , , , , , и . WWW, стр. 289-299. ACM, (2015)Case for 5G-aware video streaming applications., , , , , и . 5G-MeMZ@SIGCOMM, стр. 27-34. ACM, (2021)A variegated look at 5G in the wild: performance, power, and QoE implications., , , , , , , , , и 2 other автор(ы). SIGCOMM, стр. 610-625. ACM, (2021)Password policies of most top websites fail to follow best practices., , и . SOUPS @ USENIX Security Symposium, стр. 561-580. USENIX Association, (2022)Mitigating dataset harms requires stewardship: Lessons from 1000 papers., , и . NeurIPS Datasets and Benchmarks, (2021)