Author of the publication

Privacy Invasive Software in File-Sharing Tools.

, , and . International Information Security Workshops, volume 148 of IFIP, page 277-292. Kluwer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Risk Exposure of Smart Home Automation Systems., , and . FiCloud, page 183-190. IEEE Computer Society, (2014)Security Aspects on Inter-organizational Cooperation Using Wrapper Agents., , , , and . ATOP@AAMAS, volume 25 of Lecture Notes in Business Information Processing, page 220-233. Springer, (2008)HOMEFUS: A Privacy and Security-Aware Model for IoT Data Fusion in Smart Connected Homes., and . IoTBDS, page 133-140. SCITEPRESS, (2024)Is your home becoming a spy?: a data-centered analysis and classification of smart connected home systems., , and . IOT, page 17:1-17:8. ACM, (2020)IoTSM: An End-to-end Security Model for IoT Ecosystems., , , and . PerCom Workshops, page 267-272. IEEE, (2019)An Investigation of Vulnerabilities in Smart Connected Cameras., , and . PerCom Workshops, page 537-542. IEEE Computer Society, (2018)On Contamination in Information Ecosystems., and . HICSS, IEEE Computer Society, (2005)Smart Homes as Digital Ecosystems: Exploring Privacy in IoT Contexts., , and . ICISSP, page 869-877. SCITEPRESS, (2024)On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces., and . Privacy and Identity Management, volume 576 of IFIP Advances in Information and Communication Technology, page 126-141. Springer, (2019)A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting., , , and . ARES, page 11-19. IEEE Computer Society, (2015)