Author of the publication

An Empirical Study of the Use of Integrity Verification Mechanisms for Web Subresources.

, , , , and . WWW, page 34-45. ACM / IW3C2, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breadcrumbs: A Rich Mobility Dataset with Point-of-Interest Annotations., , , , , and . SIGSPATIAL/GIS, page 508-511. ACM, (2019)An Empirical Study of the Usage of Checksums for Web Downloads., , , and . WWW, page 2155-2165. ACM, (2023)Privacy-Preserving Location-Based Services by using Intel SGX., , and . HumanSys@SenSys, page 13-18. ACM, (2017)Capstone: Mobility Modeling on Smartphones to Achieve Privacy by Design., , , and . TrustCom/BigDataSE, page 964-971. IEEE, (2018)Throughput: A Key Performance Measure of Content-Defined Chunking Algorithms., , and . ICDCS Workshops, page 7-12. IEEE Computer Society, (2016)Knowledgeable Chunking., and . NETYS, volume 9466 of Lecture Notes in Computer Science, page 456-460. Springer, (2015)Capturing complex behaviour for predicting distant future trajectories., , , and . MobiGIS, page 64-73. ACM, (2016)A Horizontally Scalable and Reliable Architecture for Location-Based Publish-Subscribe., , and . SRDS, page 74-83. IEEE Computer Society, (2017)Extracting Hotspots without A-priori by Enabling Signal Processing over Geospatial Data., , , and . SIGSPATIAL/GIS, page 79:1-79:4. ACM, (2017)An Empirical Study of the Use of Integrity Verification Mechanisms for Web Subresources., , , , and . WWW, page 34-45. ACM / IW3C2, (2020)