Author of the publication

iTLM: A Privacy Friendly Crowdsourcing Architecture for Intelligent Traffic Light Management.

, , , and . DATA, page 252-259. SciTePress, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Mobility Management for Third Generation Mobile Networks., , and . Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 72-83. Chapman & Hall, (1996)Experiences by Using AFFINE for Building Collaborative Applications for Online Communities., and . HCI (26), volume 8029 of Lecture Notes in Computer Science, page 345-354. Springer, (2013)The Hitting Set Attack on Anonymity Protocols., and . Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 326-339. Springer, (2004)Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web., and . Sicherheit, volume P-62 of LNI, page 233-244. GI, (2005)Effect of Group Based Synchronization on User Anonymity in Mix Networks., and . ARES, page 146:1-146:9. ACM, (2023)iTLM-Q: A Constraint-Based Q-Learning Approach for Intelligent Traffic Light Management., , , , and . DATA (Revised Selected Papers), volume 1446 of Communications in Computer and Information Science, page 56-79. Springer, (2020)iTLM: A Privacy Friendly Crowdsourcing Architecture for Intelligent Traffic Light Management., , , and . DATA, page 252-259. SciTePress, (2020)GridPriv: A Smart Metering Architecture Offering k-Anonymity., and . TrustCom, page 419-426. IEEE Computer Society, (2012)Analyzing the Gold Star Scheme in a Split Tor Network., , and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-95. Springer, (2011)Introducing Perfect Forward Secrecy for AN.ON., and . EUNICE, volume 6164 of Lecture Notes in Computer Science, page 132-142. Springer, (2010)