Author of the publication

AdDroid: privilege separation for applications and advertisers in Android.

, , , and . AsiaCCS, page 71-72. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prerendered User Interfaces for Higher-Assurance Electronic Voting., , , and . EVT, USENIX Association, (2006)Portably solving file races with hardness amplification., , , and . TOS, 4 (3): 9:1-9:30 (2008)Security in wireless sensor networks., , and . Commun. ACM, 47 (6): 53-57 (2004)Markov Truncated Differential Cryptanalysis of Skipjack., and . Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 110-128. Springer, (2002)Privacy Attitudes of Smart Speaker Users., , , , , and . PoPETs, 2019 (4): 250-271 (2019)TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web., and . First Monday, (1998)Defensive Distillation is Not Robust to Adversarial Examples., and . CoRR, (2016)Cryptanalysis of the Yi-Lam Hash.. ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 483-488. Springer, (2000)A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings., and . TACAS, volume 2988 of Lecture Notes in Computer Science, page 280-295. Springer, (2004)Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation.. FSE, volume 1372 of Lecture Notes in Computer Science, page 254-269. Springer, (1998)