Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey on the evolution of privacy enforcement on smartphones and the road ahead., , and . Pervasive Mob. Comput., (2017)CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps., , , , , , and . MobiQuitous, page 262-271. ACM, (2017)CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively., , , , , and . CoRR, (2021)A Moderation Framework for the Swift and Transparent Removal of Illicit Blockchain Content., , , , and . ICBC, page 1-9. IEEE, (2022)POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages., , , , , , and . CCS, page 2411-2413. ACM, (2021)FAIR Sensor Ecosystem: Long-Term (Re-)Usability of FAIR Sensor Data through Contextualization., , , , and . INDIN, page 1-8. IEEE, (2023)POSTER: Traffic Splitting to Counter Website Fingerprinting., , , , , , , and . CCS, page 2533-2535. ACM, (2019)Unlocking Secure Industrial Collaborations through Privacy-Preserving Computation., , and . ERCIM News, (2021)FactDAG: Formalizing Data Interoperability in an Internet of Production., , , , , , , , , and 4 other author(s). IEEE Internet Things J., 7 (4): 3243-3253 (2020)Cookie Banners and Privacy Policies: Measuring the Impact of the GDPR on the Web., , and . ACM Trans. Web, 15 (4): 20:1-20:42 (2021)