Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer-to-Peer Issue Tracking System: Challenges and Solutions., , and . Software Engineering (Workshops), volume P-122 of LNI, page 77-81. GI, (2008)Privacy-Aware and Highly-Available OSN Profiles., , and . WETICE, page 211-216. IEEE Computer Society, (2010)User-side adaptive protection of location privacy in participatory sensing., , , , and . GeoInformatica, 18 (1): 165-191 (2014)The Case of Coopetition: Facebook and Decentralized Alternatives.. Tiny Trans. Comput. Sci., (2013)Tunable Privacy for Access-Controlled Data in Peer-to-Peer Systems, , , and . page 1-8. (2010)Towards access control aware P2P data management systems., , and . EDBT/ICDT Workshops, volume 360 of ACM International Conference Proceeding Series, page 10-17. ACM, (2009)My3: A highly-available P2P-based online social network., , and . Peer-to-Peer Computing, page 166-167. IEEE, (2011)Towards the Realization of Decentralized Online Social Networks: An Empirical Study., , and . ICDCS Workshops, page 155-162. IEEE Computer Society, (2012)Exploiting User Behaviors from Today's Online Social Networks to Build Distributed Alternatives.. Tiny Trans. Comput. Sci., (2013)Tunable privacy for access controlled data in peer-to-peer systems., , , and . ITC, page 1-8. IEEE, (2010)