Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimenting with Fast Private Set Intersection., and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 55-73. Springer, (2012)On the Origins of Memes by Means of Fringe Web Communities., , , , , , and . Internet Measurement Conference, page 188-202. ACM, (2018)Controlled Data Sharing for Collaborative Predictive Blacklisting., , and . DIMVA, volume 9148 of Lecture Notes in Computer Science, page 327-349. Springer, (2015)(If) Size Matters: Size-Hiding Private Set Intersection., , and . Public Key Cryptography, volume 6571 of Lecture Notes in Computer Science, page 156-173. Springer, (2011)Harvesting SSL Certificate Data to Identify Web-Fraud., , , and . Int. J. Netw. Secur., 14 (6): 324-338 (2012)Detecting Aggressors and Bullies on Twitter., , , , , and . WWW (Companion Volume), page 767-768. ACM, (2017)Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web., , , , , and . WWW (Companion Volume), page 218-226. ACM, (2019)Of Wines and Reviews: Measuring and Modeling the Vivino Wine Social Network., , and . ASONAM, page 387-392. IEEE Computer Society, (2018)Short paper: PEPSI - privacy-enhanced participatory sensing infrastructure., and . WISEC, page 23-28. ACM, (2011)Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots., , , , and . Internet Measurement Conference, page 129-136. ACM, (2014)