Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Large-Scale Synthetic Social Mobile Networks with SWIM., , and . IEEE Trans. Mob. Comput., 13 (1): 116-129 (2014)Social-Aware Forwarding Improves Routing Performance in Pocket Switched Networks., , , , and . ESA, volume 6942 of Lecture Notes in Computer Science, page 723-735. Springer, (2011)Scan-and-Pay on Android is Dangerous., , and . CoRR, (2019)Preserving Smartphone Users' Anonymity in Cloudy Days., , , and . ICCCN, page 1-5. IEEE, (2013)GDPR: When the Right to Access Personal Data Becomes a Threat., , , and . ICWS, page 75-83. IEEE, (2020)SWIM: A Simple Model to Generate Small Mobile Worlds, and . CoRR, (2008)Signals from the crowd: uncovering social relationships through smartphone probes., , , , and . Internet Measurement Conference, page 265-276. ACM, (2013)Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system., , , , and . INFOCOM, page 2355-2363. IEEE, (2014)SWIM: A Simple Model to Generate Small Mobile Worlds., and . INFOCOM, page 2106-2113. IEEE, (2009)FAN: friendship based anonymous routing in wireless social mobile networks of malicious communities., , and . ExtremeCom, page 13:1-13:6. ACM, (2011)