Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A data fusion framework for large-scale measurement platforms., , , , and . IEEE BigData, page 2150-2158. IEEE Computer Society, (2015)Context-Derived Pseudonyms for Protection of Privacy in Transport Middleware and Applications., , , and . PerCom Workshops, page 395-400. IEEE Computer Society, (2007)Privacy for RFID through trusted computing., , and . WPES, page 31-34. ACM, (2005)Policing congestion response in an internetwork using re-feedback., , , , , and . SIGCOMM, page 277-288. ACM, (2005)A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags., , and . Selected Areas in Cryptography, volume 3897 of Lecture Notes in Computer Science, page 276-290. Springer, (2005)An Adaptive Method for Dynamic Audience Size Estimation in Multicast., , and . Networked Group Communication, volume 2816 of Lecture Notes in Computer Science, page 23-33. Springer, (2003)