Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting TLS Client Authentication for Widespread User Tracking., , , , and . Proc. Priv. Enhancing Technol., 2018 (4): 51-63 (2018)Handoff All Your Privacy - A Review of Apple's Bluetooth Low Energy Continuity Protocol., , , , , , , , , and . Proc. Priv. Enhancing Technol., 2019 (4): 34-53 (2019)Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds., , , , , and . Proc. Priv. Enhancing Technol., 2021 (3): 164-181 (2021)EUI-64 Considered Harmful., , and . CoRR, (2019)Effects of channel environment on timing advance for mobile device positioning in long-term evolution networks., , , , , and . ACSSC, page 643-647. IEEE, (2016)A Visual BSP Programming Environment for Distributed Computing., and . CANPC, volume 1797 of Lecture Notes in Computer Science, page 15-29. Springer, (2000)A graph-theoretic approach to virtual access point correlation., , and . CNS, page 1-9. IEEE, (2017)A Study of MAC Address Randomization in Mobile Devices and When it Fails., , , , , , , and . Proc. Priv. Enhancing Technol., 2017 (4): 365-383 (2017)Fusion of Mobile Device Signal Data Attributes Enables Multi-Protocol Entity Resolution and Enhanced Large-Scale Tracking., , , , and . CoRR, (2019)Who Tracks the Trackers?: Circumventing Apple's Anti-Tracking Alerts in the Find My Network., , , , , , , and . WPES@CCS, page 181-186. ACM, (2021)