Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices., and . SPSM@CCS, page 15-26. ACM, (2015)Access control to people location information., and . ACM Trans. Inf. Syst. Secur., 8 (4): 424-456 (2005)Secure crash reporting in vehicular Ad hoc networks., and . SecureComm, page 443-452. IEEE, (2007)Achieving Efficient Query Privacy for Location Based Services., , , and . Privacy Enhancing Technologies, volume 6205 of Lecture Notes in Computer Science, page 93-110. Springer, (2010)Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance., and . Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, page 47-61. Springer, (2011)Panic Passwords: Authenticating under Duress., and . HotSec, USENIX Association, (2008)PUPy: A Generalized, Optimistic Context Detection Framework for Implicit Authentication., and . PST, page 1-10. IEEE, (2021)Hiding Location Information from Location-Based Services.. MDM, page 268-272. IEEE, (2007)Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns., , and . SocialCom/PASSAT, page 974-980. IEEE Computer Society, (2011)Distributed, Uncertainty-Aware Access Control for Pervasive Computing., and . PerCom Workshops, page 241-246. IEEE Computer Society, (2007)