Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pythia: a privacy aware, peer-to-peer network for social search., , , and . WPES, page 43-48. ACM, (2011)Understanding the Physical Safety, Security, and Privacy Concerns of People with Visual Impairments., , , , , and . IEEE Internet Comput., 21 (3): 56-63 (2017)Community-Enhanced De-anonymization of Online Social Networks., , and . ACM Conference on Computer and Communications Security, page 537-548. ACM, (2014)GANGRENE: Exploring the Mortality of Flash Memory., and . HotSec, USENIX Association, (2012)"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications., , , , and . USENIX Security Symposium, page 1929-1948. USENIX Association, (2020)Enhancing Lifelogging Privacy by Detecting Screens., , , , and . CHI, page 4309-4314. ACM, (2016)BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation., , and . NDSS, The Internet Society, (2012)The Impact of Viral Posts on Visibility and Behavior of Professionals: A Longitudinal Study of Scientists on Twitter., , , , and . ICWSM, page 323-334. AAAI Press, (2022)Defending against device theft with human notarization., , , and . CollaborateCom, page 8-17. ICST / IEEE, (2014)Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms., , , , , , and . CHI, page 367. ACM, (2019)