From post

Contact Tracing by Giant Data Collectors: Opening Pandora's Box of Threats to Privacy, Sovereignty and National Security

, , , , , , , , , , , и . University works, EPFL, Switzerland ; Inria, France ; JMU Würzburg, Germany ; University of Salerno, Italy ; base23, Geneva, Switzerland ; Technical University of Darmstadt, Germany, (декабря 2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Simple Privacy Extension for Mobile IPV6., , и . MWCN, том 162 из IFIP, стр. 239-249. Kluwer/Springer, (2004)On the (Im)possibility of aggregate message authentication codes., и . ISIT, стр. 235-239. IEEE, (2008)Enhancing Transparency and Consent in the IoT., , , и . EuroS&P Workshops, стр. 116-119. IEEE, (2018)Empirical analysis of UWB channel characteristics for secret key generation in indoor environments., , и . PIMRC, стр. 1984-1989. IEEE, (2010)Improving secure server performance by re-balancing SSL/TLS handshakes., , и . AsiaCCS, стр. 26-34. ACM, (2006)Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet., и . SAINT, стр. 169-172. IEEE Computer Society, (2009)Securing Group Management in IPv6 with Cryptographically Generated Addresses., и . ISCC, стр. 588-593. IEEE Computer Society, (2003)Protecting against physical resource monitoring., , и . WPES, стр. 23-32. ACM, (2011)Extending SAT Solvers to Cryptographic Problems., , и . SAT, том 5584 из Lecture Notes in Computer Science, стр. 244-257. Springer, (2009)Proximity-based access control for implantable medical devices., , , и . ACM Conference on Computer and Communications Security, стр. 410-419. ACM, (2009)