Author of the publication

A Practical Location Privacy Attack in Proximity Services.

, , and . MDM (1), page 87-96. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting Temporal Reasoning by Mapping Calendar Expressions to Minimal Periodic Sets., , and . J. Artif. Intell. Res., (2007)Anonymity and Historical-Anonymity in Location-Based Services., , , , and . Privacy in Location-Based Applications, volume 5599 of Lecture Notes in Computer Science, page 1-30. Springer, (2009)Supporting Orientation of People with Visual Impairment: Analysis of Large Scale Usage Data., , , , , and . ASSETS, page 151-159. ACM, (2016)μGraph: Haptic Exploration and Editing of 3D Chemical Diagrams., , and . ASSETS, page 312-317. ACM, (2019)WordMelodies: Supporting Children with Visual Impairment in Learning Literacy., , , and . ASSETS, page 642-644. ACM, (2019)WordMelodies: Supporting the Acquisition of Literacy Skills by Children with Visual Impairment through a Mobile App., , , and . ACM Trans. Access. Comput., 16 (1): 5:1-5:19 (March 2023)Remote Usage Data Collection and Analysis for Mobile Accessibility Applications., , , , and . PerCom Workshops, page 93-98. IEEE, (2021)Privacy protection through anonymity in location-based services.. University of Milan, Italy, (2008)Zebra Crossing Spotter: Automatic Population of Spatial Databases for Increased Safety of Blind Travelers., , , and . ASSETS, page 251-258. ACM, (2015)Rehabilitation through Accessible Mobile Gaming and Wearable Sensors., , , , , , and . ASSETS, page 82:1-82:4. ACM, (2021)