Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages., , , , , , and . CCS, page 2411-2413. ACM, (2021)A Moderation Framework for the Swift and Transparent Removal of Illicit Blockchain Content., , , , and . ICBC, page 1-9. IEEE, (2022)CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively., , , , , and . CoRR, (2021)A survey on the evolution of privacy enforcement on smartphones and the road ahead., , and . Pervasive Mob. Comput., (2017)CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps., , , , , , and . MobiQuitous, page 262-271. ACM, (2017)FAIR Sensor Ecosystem: Long-Term (Re-)Usability of FAIR Sensor Data through Contextualization., , , , and . INDIN, page 1-8. IEEE, (2023)POSTER: Traffic Splitting to Counter Website Fingerprinting., , , , , , , and . CCS, page 2533-2535. ACM, (2019)FactDAG: Formalizing Data Interoperability in an Internet of Production., , , , , , , , , and 4 other author(s). IEEE Internet Things J., 7 (4): 3243-3253 (2020)Unlocking Secure Industrial Collaborations through Privacy-Preserving Computation., , and . ERCIM News, (2021)Cookie Banners and Privacy Policies: Measuring the Impact of the GDPR on the Web., , and . ACM Trans. Web, 15 (4): 20:1-20:42 (2021)