Author of the publication

Who's your best friend?: targeted privacy attacks In location-sharing social networks.

, , , , , , and . UbiComp, page 177-186. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model-Based Security Testing Approach for Automotive Over-The-Air Updates., , , and . ICST Workshops, page 6-13. IEEE, (2020)Analysis and implementation of virtual private network support in corporate networks., and . Parallel and Distributed Computing and Networks, page 251-256. IASTED/ACTA Press, (2004)Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications., , , and . WISTP, volume 10741 of Lecture Notes in Computer Science, page 113-129. Springer, (2017)Combining Third Party Components Securely in Automotive Systems., , , and . WISTP, volume 9895 of Lecture Notes in Computer Science, page 262-269. Springer, (2016)A Formal Approach to Analysing Knowledge Transfer Processes in Developing Countries., , and . SEFM, volume 7041 of Lecture Notes in Computer Science, page 486-501. Springer, (2011)A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example., , , , and . QRS Companion, page 1-8. IEEE, (2019)Performance of Multimedia Applications with IPSec Tunneling., , , and . ITCC, page 134-138. IEEE Computer Society, (2002)Analysing the Woo-Lam Protocol Using CSP and Rank Functions., and . WOSIS, page 3-12. INSTICC Press, (2005)A Deployment Value Model for Intrusion Detection Sensors., , , , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 250-259. Springer, (2009)A Study of Encrypted, Tunneling Models in Virtual Private Networks., , , and . ITCC, page 139-143. IEEE Computer Society, (2002)