Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing the Real-World Security of the Algorand Blockchain., , , , , and . IACR Cryptol. ePrint Arch., (2023)Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights., , , , , and . CHI, page 1649-1658. ACM, (2015)Analyzing the Real-World Security of the Algorand Blockchain., , , , and . CCS, page 830-844. ACM, (2023)Vault: Fast Bootstrapping for Cryptocurrencies., , , and . IACR Cryptology ePrint Archive, (2018)Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies., , , , and . USENIX Security Symposium, page 4237-4254. USENIX Association, (2022)pSlash: A Web Content Management System., and . CATA, page 289-292. ISCA, (2002)Vault: Fast Bootstrapping for the Algorand Cryptocurrency., , , and . NDSS, The Internet Society, (2019)Aardvark: A Concurrent Authenticated Dictionary with Short Proofs., , , , and . IACR Cryptol. ePrint Arch., (2020)Stadium: A Distributed Metadata-Private Messaging System., , , , and . SOSP, page 423-440. ACM, (2017)Smart Locks: Lessons for Securing Commodity Internet of Things Devices., , , , , and . AsiaCCS, page 461-472. ACM, (2016)