Author of the publication

Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR.

, and . Proc. Priv. Enhancing Technol., 2020 (2): 481-498 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR., and . Proc. Priv. Enhancing Technol., 2020 (2): 481-498 (2020)Mapping the Privacy Landscape for Central Bank Digital Currencies., , , and . Commun. ACM, 66 (3): 46-53 (March 2023)Not All Code are Create2 Equal., and . Financial Cryptography Workshops, volume 13412 of Lecture Notes in Computer Science, page 516-538. Springer, (2022)Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys., , , and . USENIX Security Symposium, page 2259-2273. USENIX Association, (2023)Forensics of High Quality and Nearly Identical JPEG Image Recompression., , , , and . IH&MMSec, page 11-21. ACM, (2016)The Operational Cost of Ethereum Airdrops., and . DPM/CBT@ESORICS, volume 11737 of Lecture Notes in Computer Science, page 255-270. Springer, (2019)Social Lending aus der Perspektive des Datenschutzes., and . Sicherheit, volume P-170 of LNI, page 317-328. GI, (2010)Know Your Library: How the libjpeg Version Influences Compression and Decompression Results., , and . IH&MMSec, page 19-25. ACM, (2022)Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security Implications., and . USENIX Security Symposium, USENIX Association, (2024)Predictable rain?: steganalysis of public-key steganography using wet paper codes., , and . IH&MMSec, page 97-108. ACM, (2014)