Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Whither Software?. IEEE Secur. Priv., 21 (2): 89-90 (March 2023)Identity.. IEEE Secur. Priv., 20 (4): 71-72 (2022)What I've Learned.. IEEE Secur. Priv., 22 (4): 135-136 (July 2024)"Free" as in Freedom to Protest?, , , , , , , , and . IEEE Secur. Priv., 20 (5): 16-21 (2022)Polarization.. IEEE Secur. Priv., 12 (1): 88 (2014)Less Is More: Saving the Internet from Itself.. IEEE Secur. Priv., 13 (1): 80 (2015)Information Security: Why the Future Belongs to the Quants., , and . IEEE Secur. Priv., 1 (4): 24-32 (2003)Kerberos with Clocks Adrift: History, Protocols, and Implementation., and . Computing Systems, 9 (1): 29-46 (1996)Nothing Ventured, Nothing Gained., and . IEEE Secur. Priv., 8 (2): 86-87 (2010)Security Is a Subset of Reliability., and . IEEE Secur. Priv., 6 (6): 86-87 (2008)