From post

Contact Tracing by Giant Data Collectors: Opening Pandora's Box of Threats to Privacy, Sovereignty and National Security

, , , , , , , , , , , и . University works, EPFL, Switzerland ; Inria, France ; JMU Würzburg, Germany ; University of Salerno, Italy ; base23, Geneva, Switzerland ; Technical University of Darmstadt, Germany, (декабря 2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Host-Based Intrusion Detection for Advanced Mobile Devices., и . AINA (2), стр. 72-76. IEEE Computer Society, (2006)Ad-hoc key agreement: A brief history and the challenges ahead., и . Comput. Commun., (2018)AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication., , , , и . IEEE J. Sel. Areas Commun., 37 (6): 1402-1412 (2019)HomeSnitch: behavior transparency and control for smart home IoT devices., , , , , и . WiSec, стр. 128-138. ACM, (2019)Peek-a-boo: i see your smart home activities, even encrypted!, , , , , , , , и . WISEC, стр. 207-218. ACM, (2020)Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling., , , и . SocialCom/PASSAT, стр. 471-480. IEEE Computer Society, (2012)Queryable Lossless Log Database Compression., , , и . KDID, стр. 70-79. Rudjer Boskovic Institute, Zagreb, Croatia, (2003)Context and communication profiling for IoT security and privacy: techniques and applications.. Darmstadt University of Technology, Germany, (2019)Towards security policy decisions based on context profiling., и . AISec, стр. 19-23. ACM, (2010)A probabilistic kernel method for human mobility prediction with smartphones., , , и . Pervasive Mob. Comput., (2015)