Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the Physical Safety, Security, and Privacy Concerns of People with Visual Impairments., , , , , and . IEEE Internet Comput., 21 (3): 56-63 (2017)Community-Enhanced De-anonymization of Online Social Networks., , and . ACM Conference on Computer and Communications Security, page 537-548. ACM, (2014)Pythia: a privacy aware, peer-to-peer network for social search., , , and . WPES, page 43-48. ACM, (2011)BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation., , and . NDSS, The Internet Society, (2012)GANGRENE: Exploring the Mortality of Flash Memory., and . HotSec, USENIX Association, (2012)"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications., , , , and . USENIX Security Symposium, page 1929-1948. USENIX Association, (2020)Enhancing Lifelogging Privacy by Detecting Screens., , , , and . CHI, page 4309-4314. ACM, (2016)Addressing Physical Safety, Security, and Privacy for People with Visual Impairments., , , , and . SOUPS, page 341-354. USENIX Association, (2016)The Impact of Viral Posts on Visibility and Behavior of Professionals: A Longitudinal Study of Scientists on Twitter., , , , and . ICWSM, page 323-334. AAAI Press, (2022)Defending against device theft with human notarization., , , and . CollaborateCom, page 8-17. ICST / IEEE, (2014)