Dabrowski, Adrian
546  results:
Search for persons X
?
1

Mental Models, Expectations and Implications of Client-Side..:

, In: Proceedings of the CHI Conference on Human Factors in Computing Systems,
 
?
2

In Focus, Out of Privacy: The Wearer's Perspective on the P..:

, In: Proceedings of the CHI Conference on Human Factors in Computing Systems,
 
?
5

Usable Authentication in Virtual Reality: Exploring the Usa..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
6

Perceptions of Distributed Ledger Technology Key Management..:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
 
?
9

Investigating Security Folklore: A Case Study on the Tor ov..:

Fassl, Matthias ; Ponticello, Alexander ; Dabrowski, Adrian.
Proceedings of the ACM on Human-Computer Interaction.  7 (2023)  CSCW2 - p. 1-26 , 2023
 
?
10

PKRU-safe : automatically locking down the heap between ..:

, In: Proceedings of the Seventeenth European Conference on Computer Systems,
Kirth, Paul ; Dickerson, Mitchel ; Crane, Stephen... - p. 132-148 , 2022
 
?
11

Better Keep Cash in Your Boots - Hardware Wallets are the N..:

, In: Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and Security,
 
?
12

BinRec : dynamic binary lifting and recompilation:

, In: Proceedings of the Fifteenth European Conference on Computer Systems,
Altinay, Anil ; Nash, Joseph ; Kroes, Taddeus... - p. 1-16 , 2020
 
?
13

Measuring Cookies and Web Privacy in a Post-GDPR World:

, In: Passive and Active Measurement; Lecture Notes in Computer Science,
 
?
14

Botnets causing blackouts: how coordinated load attacks can..:

Dabrowski, Adrian ; Ullrich, Johanna ; Weippl, Edgar R.
e & i Elektrotechnik und Informationstechnik.  135 (2018)  3 - p. 250-255 , 2018
 
?
15

Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Coul..:

, In: Research in Attacks, Intrusions, and Defenses; Lecture Notes in Computer Science,
 
1-15