Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantifying Information Flow for Dynamic Secrets., , , and . IEEE Symposium on Security and Privacy, page 540-555. IEEE Computer Society, (2014)Latent Factor Interpretations for Collaborative Filtering., , , and . CoRR, (2017)Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs., , , , and . ACM Conference on Computer and Communications Security, page 1193-1210. ACM, (2017)Quantifying Vulnerability of Secret Generation Using Hyper-Distributions., , and . POST, volume 10204 of Lecture Notes in Computer Science, page 26-48. Springer, (2017)Build It, Break It, Fix It: Contesting Secure Development., , , , , and . ACM Conference on Computer and Communications Security, page 690-703. ACM, (2016)Dynamic Enforcement of Knowledge-Based Security Policies., , , and . CSF, page 114-128. IEEE Computer Society, (2011)Supervising Feature Influence., , , and . CoRR, (2018)Build It, Break It, Fix It: Contesting Secure Development., , , , , , , and . CoRR, (2019)Knowledge-oriented secure multiparty computation., , , and . PLAS, page 2. ACM, (2012)PLAS 2019: ACM SIGSAC Workshop on Programming Languages and Analysis for Security., and . CCS, page 2715. ACM, (2019)