Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resilient secure aggregation for vehicular networks., , , , and . IEEE Network, 24 (1): 26-31 (2010)Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard., , , and . LCN, page 14-21. IEEE Computer Society, (2009)PriCal: context-adaptive privacy in ambient calendar displays., , , , , and . UbiComp, page 499-510. ACM, (2014)Towards context adaptive privacy decisions in ubiquitous computing., , , and . PerCom Workshops, page 407-410. IEEE Computer Society, (2012)Privacy Management and Control in ATRACO., , and . AmI, volume 6439 of Lecture Notes in Computer Science, page 51-60. Springer, (2010)Prifi beacons: piggybacking privacy implications on wifi beacons., , and . UbiComp (Adjunct Publication), page 83-86. ACM, (2013)Ginger: An Access Control Framework for Telematics Applications., , , , and . TrustCom, page 474-481. IEEE Computer Society, (2012)PrivacyJudge: Effective Privacy Controls for Online Published Information., , , and . SocialCom/PASSAT, page 935-941. IEEE Computer Society, (2011)PriCal: dynamic privacy adaptation of collaborative calendar displays., , , and . UbiComp (Adjunct Publication), page 223-226. ACM, (2013)PriPref broadcaster: enabling users to broadcast privacy preferences in their physical proximity., , , and . MUM, page 133-142. ACM, (2014)