From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fast Message Franking: From Invisible Salamanders to Encryptment., , , и . IACR Cryptology ePrint Archive, (2019)Partitioning Oracle Attacks., , и . USENIX Security Symposium, стр. 195-212. USENIX Association, (2021)Increasing Adversarial Uncertainty to Scale Private Similarity Testing., , , , и . USENIX Security Symposium, стр. 1777-1794. USENIX Association, (2022)Account Security Interfaces: Important, Unintuitive, and Untrustworthy., , , , и . USENIX Security Symposium, стр. 3601-3618. USENIX Association, (2023)A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19., , , , и . CHI, стр. 71:1-71:17. ACM, (2021)Characterizing Twitter Users Who Engage in Adversarial Interactions against Political Candidates., , и . CHI, стр. 1-13. ACM, (2020)Guarding Serverless Applications with SecLambda., , , , и . CoRR, (2020)Trauma-Informed Computing: Towards Safer Technology Experiences for All., , , , , , , , и . CHI, стр. 544:1-544:20. ACM, (2022)A Fast and Simple Partially Oblivious PRF, with Applications., , , , , и . EUROCRYPT (2), том 13276 из Lecture Notes in Computer Science, стр. 674-705. Springer, (2022)The Many Kinds of Creepware Used for Interpersonal Attacks., , , , , , и . SP, стр. 626-643. IEEE, (2020)