Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What's the Gist? Privacy-Preserving Aggregation of User Profiles., , , and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 128-145. Springer, (2014)Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks., , , , and . Mob. Networks Appl., 18 (3): 413-428 (2013)SensorTune: a mobile auditory interface for DIY wireless sensor networks., , , , , , and . CHI, page 2317-2326. ACM, (2010)Secure Vehicular Communications: Design and Architecture, , , , , , , , , and . IEEE Communications Magazine, 46 (11): 2--8 (November 2008)Self-organized Anonymous Authentication in Mobile Ad Hoc Networks., , and . SecureComm, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 350-372. Springer, (2009)Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing., , , and . WISCS@CCS, page 21-29. ACM, (2014)Privacy, efficiency & fault tolerance in aggregate computations on massive star networks., , , and . WIFS, page 1-6. IEEE, (2015)On the Age of Pseudonyms in Mobile Ad Hoc Networks., , , and . INFOCOM, page 1577-1585. IEEE, (2010)Controlled Data Sharing for Collaborative Predictive Blacklisting., , and . DIMVA, volume 9148 of Lecture Notes in Computer Science, page 327-349. Springer, (2015)The Inconvenient Truth about Web Certificates., , , and . WEIS, (2011)