Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gone in Six Characters: Short URLs Considered Harmful for Cloud Services., and . CoRR, (2016)The most dangerous code in the world: validating SSL certificates in non-browser software., , , , , and . ACM Conference on Computer and Communications Security, page 38-49. ACM, (2012)SILK-TV: Secret Information Leakage from Keystroke Timing Videos., , , , , , , , , and 2 other author(s). ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 263-280. Springer, (2018)Rethinking Security of Web-Based System Applications., , and . WWW, page 366-376. ACM, (2015)Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks., , and . NDSS, The Internet Society, (2014)EARP: Principled Storage, Sharing, and Protection for Mobile Apps., , , , , and . GetMobile Mob. Comput. Commun., 20 (3): 29-33 (2016)Common Evaluation Pitfalls in Touch-Based Authentication Systems., , , , and . CoRR, (2022)PILOT: Password and PIN information leakage from obfuscated typing videos., , , , , , , , , and 3 other author(s). Journal of Computer Security, 27 (4): 405-425 (2019)