Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FAIR: A Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Network, , and . ACM Conference on Wireless Security, WiSec'09, ACM, (2009)to appear.Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption., and . CoRR, (2015)Privacy-friendly mobility analytics using aggregate location data., , and . SIGSPATIAL/GIS, page 34:1-34:10. ACM, (2016)FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting., , and . CoRR, (2023)Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)., and . IEEE Trans. Inf. Forensics Secur., 8 (12): 2021-2033 (2013)Fast and Private Computation of Cardinality of Set Intersection and Union., , and . CANS, 7712, page 218-231. Springer, (2012)Practical Private Set Intersection Protocols with Linear Complexity., and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 143-159. Springer, (2010)Exploiting Unintended Feature Leakage in Collaborative Learning., , , and . IEEE Symposium on Security and Privacy, page 691-706. IEEE, (2019)Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization., and . IEEE Secur. Priv., 8 (4): 18-24 (2010)Understanding the Effect of Deplatforming on Social Networks., , , , , , and . WebSci, page 187-195. ACM, (2021)