Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-friendly mobility analytics using aggregate location data., , and . SIGSPATIAL/GIS, page 34:1-34:10. ACM, (2016)Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption., and . CoRR, (2015)FAIR: A Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Network, , and . ACM Conference on Wireless Security, WiSec'09, ACM, (2009)to appear.Practical Private Set Intersection Protocols with Linear Complexity., and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 143-159. Springer, (2010)Fast and Private Computation of Cardinality of Set Intersection and Union., , and . CANS, 7712, page 218-231. Springer, (2012)Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization., and . IEEE Secur. Priv., 8 (4): 18-24 (2010)Exploiting Unintended Feature Leakage in Collaborative Learning., , , and . IEEE Symposium on Security and Privacy, page 691-706. IEEE, (2019)FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting., , and . CoRR, (2023)Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)., and . IEEE Trans. Inf. Forensics Secur., 8 (12): 2021-2033 (2013)What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber., , , , , , and . WWW (Companion Volume), page 1007-1014. ACM, (2018)