Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensuring Access to Emergency Services in the Presence of Long Internet Dial-Up Calls., , , , and . Interfaces, 35 (5): 411-422 (2005)Connected cars in cellular network: a measurement study., , , , , , and . Internet Measurement Conference, page 235-241. ACM, (2017)Efficient Acquisition of Web Data through Restricted Query Interfaces., , and . WWW Posters, (2001)Automated analysis of P3P-enabled Web sites., , and . ICEC, volume 50 of ACM International Conference Proceeding Series, page 326-338. ACM, (2003)Language Identification: a Neural Network Approach., , and . SLATE, volume 38 of OASIcs, page 251-265. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2014)Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine., , , and . Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science, page 314-328. Springer, (2004)Defending against an Internet-based attack on the physical world., , and . WPES, page 11-18. ACM, (2002)Analysis of security vulnerabilities in the movie production and distribution process., , , , and . Digital Rights Management Workshop, page 1-12. ACM, (2003)Can you find me now? Evaluation of network-based localization in a 4G LTE network., , , , , , and . INFOCOM, page 1-9. IEEE, (2017)Managing Massive Firmware-Over-The-Air Updates for Connected Cars in Cellular Networks., , , , , , , and . CarSys@MobiCom, page 65-72. ACM, (2017)