Author of the publication

Contact Tracing by Giant Data Collectors: Opening Pandora's Box of Threats to Privacy, Sovereignty and National Security

, , , , , , , , , , , and . University works, EPFL, Switzerland ; Inria, France ; JMU Würzburg, Germany ; University of Salerno, Italy ; base23, Geneva, Switzerland ; Technical University of Darmstadt, Germany, (December 2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tetrys: An On-the-Fly Network Coding Protocol., , , and . RFC, (June 2023)IGUANe: a 3D generalizable CycleGAN for multicenter harmonization of brain MR images., , , , and . CoRR, (2024)PEPPER: Precise Privacy-Preserving Contact Tracing with Cheap, BLE/UWB Capable Tokens., , , , , , and . WoWMoM, page 290-299. IEEE, (2023)Privacy-Preserving Pseudonyms for LoRaWAN., , , , , and . WISEC, page 14-19. ACM, (2024)A 3D convolutional neural network to classify subjects as Alzheimer's disease, frontotemporal dementia or healthy controls using brain 18F-FDG PET., , , , , , , , , and . NeuroImage, (2024)Forward Error Correction (FEC) Framework Extension to Sliding Window Codes., and . RFC, (January 2020)A survey of proposals for an alternative group communication service., , and . IEEE Netw., 17 (1): 46-51 (2003)Feedback to the European Data Protection Board's Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive., , , , , , and . CoRR, (2024)Device Re-identification in LoRaWAN through Messages Linkage., , , and . WISEC, page 98-103. ACM, (2022)Taxonomy of Coding Techniques for Efficient Network Communications., , , , , , , , , and 4 other author(s). RFC, (June 2018)