Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting TLS Client Authentication for Widespread User Tracking., , , , and . Proc. Priv. Enhancing Technol., 2018 (4): 51-63 (2018)Handoff All Your Privacy - A Review of Apple's Bluetooth Low Energy Continuity Protocol., , , , , , , , , and . Proc. Priv. Enhancing Technol., 2019 (4): 34-53 (2019)Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds., , , , , and . Proc. Priv. Enhancing Technol., 2021 (3): 164-181 (2021)EUI-64 Considered Harmful., , and . CoRR, (2019)Discovering the IPv6 Network Periphery., and . PAM, volume 12048 of Lecture Notes in Computer Science, page 3-18. Springer, (2020)Due to the global outbreak of COVID-19, the PAM 2020 conference was organized as a virtual meeting..Follow the Scent: Defeating IPv6 Prefix Rotation Privacy., , and . CoRR, (2021)IPv6 Hitlists at Scale: Be Careful What You Wish For., and . SIGCOMM, page 904-916. ACM, (2023)Follow the scent: defeating IPv6 prefix rotation privacy., , and . Internet Measurement Conference, page 739-752. ACM, (2021)Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Implementation., , , , , , , , , and . CoRR, (2019)IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation., and . CoRR, (2022)