Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Potential mass surveillance and privacy violations in proximity-based social applications., , and . CoRR, (2016)Systematic lossy forward error protection for video waveforms., , , and . ICIP (1), page 609-612. IEEE, (2003)An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers., , and . Data Knowl. Eng., 70 (10): 892-921 (2011)Design of Optimal Quantizers for Distributed Source Coding., , and . DCC, page 13-22. IEEE Computer Society, (2003)You Never Surf Alone. Ubiquitous Tracking of Users' Browsing Habits., , and . DPM/QASA@ESORICS, volume 9481 of Lecture Notes in Computer Science, page 273-280. Springer, (2015)Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications., , and . TrustCom/BigDataSE/ISPA (1), page 1045-1052. IEEE, (2015)Improving Opinion Analysis Through Statistical Disclosure Control in eVoting Scenarios., , , , and . EGOVIS, volume 11032 of Lecture Notes in Computer Science, page 45-59. Springer, (2018)Privacy-Preserving Enhanced Collaborative Tagging, , , , and . IEEE Transactions on Knowledge and Data Engineering, 26 (1): 180-193 (January 2014)Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach., , , , , , and . ISCRAM, ISCRAM Association, (2019)An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval., , and . FGIT-SecTech, volume 259 of Communications in Computer and Information Science, page 146-154. Springer, (2011)