Search for persons
X
?
Passive and Active Measurement; Lecture Notes in Computer Science ,
3
You Can Find Me Here: A Study of the Early Adoption of Geof..:
, In:
?
Proceedings of the 16th Cyber Security Experimentation and Test Workshop ,
4
Cadence: A Simulator for Human Movement-based Communication..:
, In:
?
Annual Computer Security Applications Conference ,
8
User Perceptions of the Privacy and Usability of Smart DNS:
, In:
?
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) ,
12
Ephemeral Exit Bridges for Tor:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
13
Bypassing Tor Exit Blocking with Exit Bridge Onion Services:
, In:
?
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems ,
14
Does Being Verified Make You More Credible? : Account Ve..:
, In:
?
Proceedings of the 35th Annual Computer Security Applications Conference ,
15