Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps., , , , , , and . MobiQuitous, page 262-271. ACM, (2017)A survey on the evolution of privacy enforcement on smartphones and the road ahead., , and . Pervasive Mob. Comput., (2017)CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively., , , , , and . CoRR, (2021)POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages., , , , , , and . CCS, page 2411-2413. ACM, (2021)A Moderation Framework for the Swift and Transparent Removal of Illicit Blockchain Content., , , , and . ICBC, page 1-9. IEEE, (2022)POSTER: Traffic Splitting to Counter Website Fingerprinting., , , , , , , and . CCS, page 2533-2535. ACM, (2019)FAIR Sensor Ecosystem: Long-Term (Re-)Usability of FAIR Sensor Data through Contextualization., , , , and . INDIN, page 1-8. IEEE, (2023)Securing Sensing in Supply Chains: Opportunities, Building Blocks, and Designs., , , , , and . IEEE Access, (2024)A Computer Science Perspective on Digital Transformation in Production., , , , , , , , , and 5 other author(s). ACM Trans. Internet Things, 3 (2): 15:1-15:32 (2022)Blockchain-based privacy preservation for supply chains supporting lightweight multi-hop information accountability., , , , , , and . Inf. Process. Manag., 58 (3): 102529 (2021)