Author of the publication

Device Names in the Wild: Investigating Privacy Risks of Zero Configuration Networking.

, , , and . MDM (2), page 51-56. IEEE Computer Society, (2013)978-1-4673-6068-5.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resilient secure aggregation for vehicular networks., , , , and . IEEE Network, 24 (1): 26-31 (2010)Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard., , , and . LCN, page 14-21. IEEE Computer Society, (2009)PriCal: context-adaptive privacy in ambient calendar displays., , , , , and . UbiComp, page 499-510. ACM, (2014)Towards context adaptive privacy decisions in ubiquitous computing., , , and . PerCom Workshops, page 407-410. IEEE Computer Society, (2012)Privacy Management and Control in ATRACO., , and . AmI, volume 6439 of Lecture Notes in Computer Science, page 51-60. Springer, (2010)Prifi beacons: piggybacking privacy implications on wifi beacons., , and . UbiComp (Adjunct Publication), page 83-86. ACM, (2013)Towards Territorial Privacy in Smart Environments., , , and . AAAI Spring Symposium: Intelligent Information Privacy Management, AAAI, (2010)Privacy context model for dynamic privacy adaptation in ubiquitous computing., , , , and . UbiComp, page 752-757. ACM, (2012)Exploring the design space of graphical passwords on smartphones., , , and . SOUPS, page 11:1-11:14. ACM, (2013)P.I.A.N.O.: Faster Piano Learning with Interactive Projection., , , , , , , , , and . ITS, page 149-158. ACM, (2014)