Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private Continual Release of Real-Valued Data Streams., , and . CoRR, (2018)Who Let theDOGSOut: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening., , , , and . DPM/CBT@ESORICS, volume 12484 of Lecture Notes in Computer Science, page 437-446. Springer, (2020)Use of cryptography in malware obfuscation., , , , , , and . J. Comput. Virol. Hacking Tech., 20 (1): 135-152 (2024)Overlay routing using coordinate systems., , , and . CoNEXT, page 42. ACM, (2008)Private Continual Release of Real-Valued Data Streams., , and . NDSS, The Internet Society, (2019)A Blockchain-enabled Anonymous-yet- Traceable Distributed Key Generation., , , , and . Blockchain, page 257-265. IEEE, (2021)Stylometric Linkability of Tweets., , , and . WPES, page 205-208. ACM, (2014)The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT., , , , , , , and . CoRR, (2019)Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants., , , , and . CoRR, (2021)Data and Model Dependencies of Membership Inference Attack., , , and . CoRR, (2020)