Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways., , , , , and . IEEE Symposium on Security and Privacy, page 339-356. IEEE Computer Society, (2016)PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation., , , and . USENIX Security Symposium, page 321-336. USENIX Association, (2013)Protecting portable storage with host validation., , and . ACM Conference on Computer and Communications Security, page 651-653. ACM, (2010)Design, implementation and evaluation of security in iSCSI-based network storage systems., , , , and . StorageSS, page 17-28. ACM, (2006)Kells: a protection framework for portable data., , and . ACSAC, page 231-240. ACM, (2010)Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST., , , , , and . EVT, USENIX Association, (2008)On detecting co-resident cloud instances using network flow watermarking techniques., , , , , and . Int. J. Inf. Sec., 13 (2): 171-189 (2014)Taming the Costs of Trustworthy Provenance through Policy Reduction., , , , , and . ACM Trans. Internet Techn., 17 (4): 34:1-34:21 (2017)Examining DES-based Cipher Suite Support within the TLS Ecosystem., , , , , and . AsiaCCS, page 539-546. ACM, (2019)Trustworthy Whole-System Provenance for the Linux Kernel., , , and . USENIX Security Symposium, page 319-334. USENIX Association, (2015)