Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Automatically Penalizing Multimedia Breaches (Extended Abstract)., , , and . EuroS&P Workshops, page 340-346. IEEE, (2019)Blockchain Access Privacy: Challenges and Directions., , and . IEEE Secur. Priv., 16 (4): 38-45 (2018)Last Mile of Blockchains: RPC and Node-as-a-service., , and . TPS-ISA, page 305-311. IEEE, (2022)Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification., , , , and . NDSS, The Internet Society, (2019)Finding Safety in Numbers with Secure Allegation Escrows., , , , and . NDSS, The Internet Society, (2020)Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures., , and . USENIX Security Symposium, page 3415-3432. USENIX Association, (2022)Verifiable Timed Signatures Made Practical., , , , , and . CCS, page 1733-1750. ACM, (2020)Reducing Automotive Counterfeiting Using Blockchain: Benefits and Challenges., , , , , , , , and . DAPPCON, page 39-48. IEEE, (2019)Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability., , , and . IACR Cryptol. ePrint Arch., (2024)Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup., , , , and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 286-313. Springer, (2019)