Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast Multi-Server, Multi-Block Private Information Retrieval Protocol., , , and . GLOBECOM, page 1-6. IEEE, (2015)Finding Sensitive Accounts on Twitter: An Automated Approach Based on Follower Anonymity., , and . ICWSM, page 655-658. AAAI Press, (2016)Detecting latent cross-platform API violations., , , , , and . ISSRE, page 484-495. IEEE Computer Society, (2015)Collaboration with DiamondTouch., , , , , and . INTERACT, volume 3585 of Lecture Notes in Computer Science, page 986-989. Springer, (2005)It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots., , , , , and . ACSAC, page 296-305. ACM, (2014)Net-X: Unified Data-Centric Internet Services., , , , and . NetDB, USENIX Association, (2007)San Fermín: Aggregating Large Data Sets Using a Binomial Swap Forest., and . NSDI, page 147-160. USENIX Association, (2008)Selectively Taming Background Android Apps to Improve Battery Lifetime., , and . USENIX Annual Technical Conference, page 563-575. USENIX Association, (2015)Dependable Self-Hosting Distributed Systems Using Constraints., , , and . HotDep, USENIX Association, (2008)Mercury: Bandwidth-Effective Prevention of Rollback Attacks Against Community Repositories., , and . USENIX Annual Technical Conference, page 673-688. USENIX Association, (2017)