Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping., , , , and . CoRR, (2018)I never signed up for this! Privacy implications of email tracking., , and . Proc. Priv. Enhancing Technol., 2018 (1): 109-126 (2018)Online Tracking: A 1-million-site Measurement and Analysis., and . ACM Conference on Computer and Communications Security, page 1388-1401. ACM, (2016)De-anonymizing Web Browsing Data with Social Networks., , , and . WWW, page 1261-1269. ACM, (2017)Perfectly Reliable Message Transmission., , and . Inf. Process. Lett., 100 (1): 23-28 (2006)Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge, , and . CoRR, (2011)Making content caching policies 'smart' using the deepcache framework., , , , and . Comput. Commun. Rev., 48 (5): 64-69 (2018)Position Estimation of Robotic Mobile Nodes in Wireless Testbed using GENI., , , , , , , and . CoRR, (2015)Resurrecting Address Clustering in Bitcoin., and . Financial Cryptography, volume 13411 of Lecture Notes in Computer Science, page 386-403. Springer, (2022)Vues: practical mobile volumetric video streaming through multiview transcoding., , , , and . MobiCom, page 514-527. ACM, (2022)