Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nithyanand, Rishab
add a person with the name Nithyanand, Rishab
 

Other publications of authors with the same name

The password allocation problem: strategies for reusing passwords effectively., and . WPES, page 255-260. ACM, (2013)The Morbid Realities of Social Media: An Investigation into the Narratives Shared by the Deceased Victims of COVID-19., and . ICWSM, page 303-314. AAAI Press, (2023)The Inventory is Dark and Full of Misinformation: Understanding Ad Inventory Pooling in the Ad-Tech Supply Chain., , and . SP, page 1590-1608. IEEE, (2024)Groupthink: usability of secure group association for wireless devices., , , and . UbiComp, page 331-340. ACM, (2010)Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs)., , and . ACM Conference on Computer and Communications Security, page 825-828. ACM, (2011)Extortion or Expansion? An Investigation into the Costs and Consequences of ICANN's gTLD Experiments., , , , and . PAM, volume 12048 of Lecture Notes in Computer Science, page 141-157. Springer, (2020)Due to the global outbreak of COVID-19, the PAM 2020 conference was organized as a virtual meeting..Exploring the Design Space of Longitudinal Censorship Measurement Platforms, , , , , , and . (2016)Measuring and mitigating AS-level adversaries against Tor., , , , and . CoRR, (2015)CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense., , and . WPES, page 121-130. ACM, (2014)Glove: A Bespoke Website Fingerprinting Defense., , and . WPES, page 131-134. ACM, (2014)