Author of the publication

How Certification Systems Fail: Lessons from the Ware Report.

, , and . IEEE Security & Privacy, 10 (6): 40-44 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editors' Introduction., and . PoPETs, 2015 (1): 1-3 (2015)Towards a Theory of Application Compartmentalisation., , , , , and . Security Protocols Workshop, volume 8263 of Lecture Notes in Computer Science, page 19-27. Springer, (2013)Incentives in Security Protocols., , and . Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 132-141. Springer, (2018)VAMS: Verifiable Auditing of Access to Confidential Data., , , , and . CoRR, (2018)Security Protocols and Evidence: Where Many Payment Systems Fail., and . Financial Cryptography, volume 8437 of Lecture Notes in Computer Science, page 21-32. Springer, (2014)Do You See What I See? Differential Treatment of Anonymous Users., , , , , , , and . NDSS, The Internet Society, (2016)How Certification Systems Fail: Lessons from the Ware Report., , and . IEEE Security & Privacy, 10 (6): 40-44 (2012)Hot or not: revealing hidden services by their clock skew.. ACM Conference on Computer and Communications Security, page 27-36. ACM, (2006)Chip and Skim: Cloning EMV Cards with the Pre-play Attack., , , , and . IEEE Symposium on Security and Privacy, page 49-64. IEEE Computer Society, (2014)The Adblocking Tug-of-War., , , , , , , , and . ;login:, (2016)