Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Share the Secret: Enabling Location Privacy in Ubiquitous Environments., , , and . LoCA, volume 3479 of Lecture Notes in Computer Science, page 289-305. Springer, (2005)Location Privacy through Secret Sharing Techniques., , , and . WOWMOM, page 614-620. IEEE Computer Society, (2005)Enabling Collaborative Medical Diagnosis Over the Internet via Peer-to-Peer Distribution of Electronic Health Records., , and . J. Medical Syst., 30 (2): 107-116 (2006)Enabling Location Privacy and Medical Data Encryption in Patient Telemonitoring Systems., , , and . IEEE Trans. Inf. Technol. Biomed., 13 (6): 946-954 (2009)A privacy-aware overlay routing scheme in WSNs., , and . Secur. Commun. Networks, 4 (7): 729-743 (2011)Applying privacy on the dissemination of location information., , , and . Telematics Informatics, 23 (3): 211-225 (2006)An incentive-based architecture to enable privacy in dynamic environments., , , and . Internet Res., 16 (2): 171-189 (2006)Providing anonymity services in SIP., , and . PIMRC, page 1-6. IEEE, (2008)ANOSIP: anonymizing the SIP protocol., , , and . MPM@EuroSys, page 4:1-4:6. ACM, (2012)iHIDE: Hiding Sources of Information in WSNs., , , and . SecPerU, page 41-48. IEEE Computer Society, (2006)