Author of the publication

What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy.

, , and . Proc. Priv. Enhancing Technol., 2017 (4): 156-176 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices., , , and . CoRR, (2021)PriFi: Low-Latency Anonymity for Organizational Networks., , , , , , , and . Proc. Priv. Enhancing Technol., 2020 (4): 24-47 (2020)Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption Evaluation., , , , and . CCS, page 3525-3527. ACM, (2023)PELTA - Shielding Multiparty-FHE against Malicious Adversaries., , , , , and . CCS, page 711-725. ACM, (2023)slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference., , , , , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 359-377. Springer, (2023)P3LI5: Practical and confidEntial Lawful Interception on the 5G core., , , , and . CNS, page 1-9. IEEE, (2023)Adaptive Hierarchical Network Structures for Wireless Sensor Networks., , , , , and . ADHOCNETS, volume 89 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 65-80. Springer, (2011)Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials., , , , , and . APF, volume 8319 of Lecture Notes in Computer Science, page 140-156. Springer, (2012)Privacy-friendly mobility analytics using aggregate location data., , and . SIGSPATIAL/GIS, page 34:1-34:10. ACM, (2016)Privacy and Integrity Preserving Computations with CRISP., , , and . USENIX Security Symposium, page 2111-2128. USENIX Association, (2021)