Author of the publication

Shadow attacks on users' anonymity in pervasive computing environments.

, , and . Pervasive Mob. Comput., 4 (6): 819-835 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preserving Privacy in Sequential Data Release against Background Knowledge Attacks, , and . CoRR, (2010)Integrating Identity, Location, and Absence Privacy in Context-Aware Retrieval of Points of Interest., , and . Mobile Data Management (1), page 135-140. IEEE Computer Society, (2011)Towards Privacy Protection in a Middleware for Context-awareness., , , and . CAT@IFIPTM, volume 269 of CEUR Workshop Proceedings, CEUR-WS.org, (2007)JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks., , and . IEEE Trans. Dependable Secur. Comput., 9 (3): 387-400 (2012)Beyond Anonymity in Location Based Services., and . SEBD, page 447-454. (2007)Efficient profile aggregation and policy evaluation in a middleware for adaptive mobile applications., , and . Pervasive Mob. Comput., 4 (5): 697-718 (2008)Protecting Users' Anonymity in Pervasive Computing Environments., , and . PerCom, page 11-19. IEEE Computer Society, (2008)Shadow attacks on users' anonymity in pervasive computing environments., , and . Pervasive Mob. Comput., 4 (6): 819-835 (2008)Is ontology-based activity recognition really effective?, , , and . PerCom Workshops, page 427-431. IEEE Computer Society, (2011)Composition and Generalization of Context Data for Privacy Preservation., , , and . PerCom, page 429-433. IEEE Computer Society, (2008)