Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Persona: an online social network with user-defined privacy., , , , and . SIGCOMM, page 135-146. ACM, (2009)Composing Abstractions using the null-Kernel., , , and . HotOS, page 1-6. ACM, (2019)Brave new world: privacy risks for mobile users., , , , and . SPME@MobiCom, page 7-12. ACM, (2014)Finding Safety in Numbers with Secure Allegation Escrows., , , , and . NDSS, The Internet Society, (2020)IP geolocation in metropolitan areas., , , , , and . SIGMETRICS, page 155-156. ACM, (2011)Using Trust in Recommender Systems: An Experimental Analysis., and . iTrust, volume 2995 of Lecture Notes in Computer Science, page 221-235. Springer, (2004)P5: A Protocol for Scalable Anonymous Communication., , and . S&P, page 58-70. IEEE Computer Society, (2002)Sonoloc: Scalable positioning of commodity mobile devices., , , , and . MobiSys, page 136-149. ACM, (2018)Multi-dimensional quorum sets for read-few write-many replica control protocols., , and . CCGRID, page 355-362. IEEE Computer Society, (2004)Channel Access Throttling for Overlapping BSS Management., , , , and . ICC, page 1-6. IEEE, (2009)