Author of the publication

Privacy Threats in E-Shopping (Position Paper).

, , , , , and . DPM/QASA@ESORICS, volume 9481 of Lecture Notes in Computer Science, page 217-225. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design Principles for Cooperative Robots with Uncertainty-Aware and Resource-Wise Adaptive Behavior., , and . Living Machines, volume 8608 of Lecture Notes in Computer Science, page 108-117. Springer, (2014)A two-step neural-network based algorithm for fast image super-resolution., and . Image Vis. Comput., 25 (9): 1449-1473 (2007)Fair anonymity for the Tor network., , and . CoRR, (2014)Improving NCD accuracy by combining document segmentation and document distortion., , , and . Knowl. Inf. Syst., 41 (1): 223-245 (2014)libgroupsig: An extensible C library for group signatures., , and . IACR Cryptology ePrint Archive, (2015)A formal methodology for integral security design and verification of network protocols, , and . CoRR, (2012)Methodological Security Verification of a Registration Protocol., , and . SOCO-CISIS-ICEUTE, volume 299 of Advances in Intelligent Systems and Computing, page 453-462. Springer, (2014)Evaluating the Impact of Information Distortion on Normalized Compression Distance-driven Text Clustering, , , and . CoRR, (2007)A hybrid MLP-PNN architecture for fast image superresolution, and . CoRR, (2005)Relevance of Contextual Information in Compression-Based Text Clustering., , , and . IDEAL, volume 6283 of Lecture Notes in Computer Science, page 259-266. Springer, (2010)