Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Price to Play: A Privacy Analysis of Free and Paid Games in the Android Ecosystem., , , and . WWW, page 3440-3449. ACM, (2022)Client-side and Server-side Tracking on Meta: Effectiveness and Accuracy., , , and . Proc. Priv. Enhancing Technol., 2024 (3): 431-445 (2024)Clustering OSGI Applications Using Distributed Shared Memory., , , and . NOTERE, page 1-8. IEEE, (2011)Taming the Variability of Browser Fingerprints., , and . SPLC (A), page 66-71. ACM, (2024)A Service-Oriented Platform for iTV Applications Deployment., , , , and . CCNC, page 1-2. IEEE, (2010)DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting., , , , , , , , , and . NDSS, The Internet Society, (2022)Actions speak louder than words: Semi-supervised learning for browser fingerprinting detection., , , , , , and . CoRR, (2020)Caught in the Game: On the History and Evolution of Web Browser Gaming., and . WWW (Companion Volume), page 601-609. ACM, (2023)Towards a Dynamic and Extensible Middleware for Enhancing Exhibits., , , and . CCNC, page 1-5. IEEE, (2010)FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security., , , and . DIMVA, volume 12756 of Lecture Notes in Computer Science, page 237-257. Springer, (2021)