Author of the publication

Towards Usable Interfaces for Proof Based Access Rights on Mobile Devices.

, and . iNetSeC, volume 7039 of Lecture Notes in Computer Science, page 15-27. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Mobility Management for Third Generation Mobile Networks., , and . Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 72-83. Chapman & Hall, (1996)Analyzing the Gold Star Scheme in a Split Tor Network., , and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-95. Springer, (2011)Towards a causality based analysis of anonymity protection in indeterministic mix systems., and . Comput. Secur., (2017)Effect of Group Based Synchronization on User Anonymity in Mix Networks., and . ARES, page 146:1-146:9. ACM, (2023)iTLM-Q: A Constraint-Based Q-Learning Approach for Intelligent Traffic Light Management., , , , and . DATA (Revised Selected Papers), volume 1446 of Communications in Computer and Information Science, page 56-79. Springer, (2020)iTLM: A Privacy Friendly Crowdsourcing Architecture for Intelligent Traffic Light Management., , , and . DATA, page 252-259. SciTePress, (2020)The Hitting Set Attack on Anonymity Protocols., and . Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 326-339. Springer, (2004)Experiences by Using AFFINE for Building Collaborative Applications for Online Communities., and . HCI (26), volume 8029 of Lecture Notes in Computer Science, page 345-354. Springer, (2013)Supporting Distributed Decision Making Using Secure Distributed User Interfaces., , , , and . Distributed User Interfaces, Springer, (2011)GridPriv: A Smart Metering Architecture Offering k-Anonymity., and . TrustCom, page 419-426. IEEE Computer Society, (2012)