Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fair content dissemination in participatory DTNs., , and . Ad Hoc Networks, 10 (8): 1633-1645 (2012)The Long Road to Computational Location Privacy: A Survey., , , and . IEEE Communications Surveys and Tutorials, 21 (3): 2772-2793 (2019)Ad Hoc Composition of User Tasks in Pervasive Computing Environments., , and . Software Composition, volume 3628 of Lecture Notes in Computer Science, page 31-46. Springer, (2005)Dynamic Modeling of Location Privacy Protection Mechanisms., , , , and . DAIS, volume 10853 of Lecture Notes in Computer Science, page 26-39. Springer, (2018)Toward an Easy Configuration of Location Privacy Protection Mechanisms., , , , , , and . Middleware Posters and Demos, page 11-12. ACM, (2016)Efficient Semantic Service Discovery in Pervasive Computing Environments., , , and . Middleware, volume 4290 of Lecture Notes in Computer Science, page 240-259. Springer, (2006)AcTinG: Accurate Freerider Tracking in Gossip., , and . SRDS, page 291-300. IEEE Computer Society, (2014)X-search: revisiting private web search using intel SGX., , , , , and . Middleware, page 198-208. ACM, (2017)A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer Systems., , , , , , and . SRDS, page 276-285. IEEE Computer Society, (2015)COCOA: COnversation-based service COmposition in pervAsive computing environments with QoS support., , and . Journal of Systems and Software, 80 (12): 1941-1955 (2007)