Author of the publication

Location management strategies increasing privacy in mobile communication.

, , , and . SEC, volume 54 of IFIP Conference Proceedings, page 39-48. Chapman & Hall, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Mobility Management for Third Generation Mobile Networks., , and . Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 72-83. Chapman & Hall, (1996)Analyzing the Gold Star Scheme in a Split Tor Network., , and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-95. Springer, (2011)Experiences by Using AFFINE for Building Collaborative Applications for Online Communities., and . HCI (26), volume 8029 of Lecture Notes in Computer Science, page 345-354. Springer, (2013)The Hitting Set Attack on Anonymity Protocols., and . Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 326-339. Springer, (2004)Supporting Distributed Decision Making Using Secure Distributed User Interfaces., , , , and . Distributed User Interfaces, Springer, (2011)Towards a causality based analysis of anonymity protection in indeterministic mix systems., and . Comput. Secur., (2017)iTLM-Q: A Constraint-Based Q-Learning Approach for Intelligent Traffic Light Management., , , , and . DATA (Revised Selected Papers), volume 1446 of Communications in Computer and Information Science, page 56-79. Springer, (2020)iTLM: A Privacy Friendly Crowdsourcing Architecture for Intelligent Traffic Light Management., , , and . DATA, page 252-259. SciTePress, (2020)Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web., and . Sicherheit, volume P-62 of LNI, page 233-244. GI, (2005)Effect of Group Based Synchronization on User Anonymity in Mix Networks., and . ARES, page 146:1-146:9. ACM, (2023)