Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Ahmad W and Liccardi I. Addressing Anonymous Abuses. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. (1-14).

    https://doi.org/10.1145/3313831.3376690

  • Russell A, Tang Q, Yung M and Zhou H. Correcting Subverted Random Oracles. Advances in Cryptology – CRYPTO 2018. (241-271).

    https://doi.org/10.1007/978-3-319-96881-0_9

  • Schuster S, van den Berg M, Larrucea X, Slewe T and Ide-Kostic P. (2017). Mass surveillance and technological policy options. Computer Standards & Interfaces. 50:C. (76-82). Online publication date: 1-Feb-2017.

    https://doi.org/10.1016/j.csi.2016.09.011

  • Muñoz A, Urueña M, Aparicio R and Rodríguez de los Santos G. (2018). Digital Wiretap Warrant. Digital Investigation: The International Journal of Digital Forensics & Incident Response. 14:C. (1-16). Online publication date: 1-Sep-2015.

    https://doi.org/10.1016/j.diin.2015.04.005