Author of the publication

Securing Anonymous Communication Channels under the Selective DoS Attack.

, and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 362-370. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond formulas-as-cographs: an extension of Boolean logic to arbitrary graphs., , and . CoRR, (2020)Understanding and mitigating the privacy risks of smartphone sensor fingerprinting. University of Illinois Urbana-Champaign, USA, (2016)MetaMorphosis: Task-oriented Privacy Cognizant Feature Generation for Multi-task Learning., , , and . IoTDI, page 288-300. ACM, (2023)Understanding People's Attitude and Concerns towards Adopting IoT Devices., , and . CHI Extended Abstracts, page 307:1-307:10. ACM, (2021)Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises., , , , , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 287-310. Springer, (2017)How Risky Are Real Users' IFTTT Applets?, , , , , , and . SOUPS @ USENIX Security Symposium, page 505-529. USENIX Association, (2020)Proof Complexity of Monotone Branching Programs., and . CiE, volume 13359 of Lecture Notes in Computer Science, page 74-87. Springer, (2022)Privacy during Pandemic: A Global View of Privacy Practices around COVID-19 Apps., , , , and . COMPASS, page 215-229. ACM, (2021)Analyzing an adaptive reputation metric for anonymity systems., , and . HotSoS, page 11. ACM, (2014)From positive and intuitionistic bounded arithmetic to monotone proof complexity.. LICS, page 126-135. ACM, (2016)