Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical, Private Assurance of the Value of Collaboration., , , and . CoRR, (2023)On the Resilience of Biometric Authentication Systems against Random Inputs., , and . NDSS, The Internet Society, (2020)Private Continual Release of Real-Valued Data Streams., , and . CoRR, (2018)A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm., , and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 349-366. (2010)Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories., , , , and . ACNS (1), volume 13905 of Lecture Notes in Computer Science, page 284-308. Springer, (2023)A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists., , , , , and . AsiaCCS, page 193-205. ACM, (2019)Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks., , , and . NDSS, The Internet Society, (2013)Private Continual Release of Real-Valued Data Streams., , and . NDSS, The Internet Society, (2019)On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models., , , , , , , and . EuroS&P, page 232-251. IEEE, (2021)A Subexponential Construction of Graph Coloring for Multiparty Computation., , , and . IACR Cryptology ePrint Archive, (2014)