Author of the publication

MAESTRO: Making Art-Enabled Sketches through Randomized Operations.

, , , and . CAIP (1), volume 6854 of Lecture Notes in Computer Science, page 318-326. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAESTRO: Making Art-Enabled Sketches through Randomized Operations., , , and . CAIP (1), volume 6854 of Lecture Notes in Computer Science, page 318-326. Springer, (2011)"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence., , , , , , and . PACMHCI, 3 (CSCW): 202:1-202:24 (2019)The TypTop System: Personalized Typo-Tolerant Password Checking., , , , and . ACM Conference on Computer and Communications Security, page 329-346. ACM, (2017)Continuum of Care Services for Maternal and Child Health using mobile technology - a health system strengthening strategy in low and middle income countries., , , , , and . BMC Med. Inf. & Decision Making, (2016)pASSWORD tYPOS and How to Correct Them Securely., , , , and . IEEE Symposium on Security and Privacy, page 799-818. IEEE Computer Society, (2016)The Pythia PRF Service., , , , and . IACR Cryptology ePrint Archive, (2015)A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing., , , , and . CRYPTO (3), volume 10403 of Lecture Notes in Computer Science, page 682-710. Springer, (2017)Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms., , , , , and . CCS, page 1171-1186. ACM, (2019)A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication., , , , and . IACR Cryptology ePrint Archive, (2017)Cracking-Resistant Password Vaults Using Natural Language Encoders., , , and . IEEE Symposium on Security and Privacy, page 481-498. IEEE Computer Society, (2015)