Author of the publication

Device Names in the Wild: Investigating Privacy Risks of Zero Configuration Networking.

, , , and . MDM (2), page 51-56. IEEE Computer Society, (2013)978-1-4673-6068-5.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On credibility improvements for automotive navigation systems., , , and . Personal and Ubiquitous Computing, 17 (5): 803-813 (2013)Privacy Requirements in Vehicular Communication Systems., , and . CSE (3), page 139-145. IEEE Computer Society, (2009)A VANET-based emergency vehicle warning system., , , and . VNC, page 1-8. IEEE, (2009)We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy., , , , , and . CoRR, (2018)Mining Privacy Goals from Privacy Policies Using Hybridized Task Recomposition., , and . ACM Trans. Softw. Eng. Methodol., 25 (3): 22:1-22:24 (2016)Towards context adaptive privacy decisions in ubiquitous computing., , , and . PerCom Workshops, page 407-410. IEEE Computer Society, (2012)Dynamic privacy adaptation in ubiquitous computing.. University of Ulm, (2014)Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations., , , , , , , , , and 1 other author(s). TWEB, 13 (1): 1:1-1:29 (2019)Keeping a Low Profile?: Technology, Risk and Privacy among Undocumented Immigrants., , , , , and . CHI, page 114. ACM, (2018)diretto: A Toolkit for Distributed Reporting and Collaboration., , , , and . Mensch & Computer, page 151-160. Oldenbourg Verlag, (2011)