Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A VANET-based emergency vehicle warning system., , , and . VNC, page 1-8. IEEE, (2009)Privacy Requirements in Vehicular Communication Systems., , and . CSE (3), page 139-145. IEEE Computer Society, (2009)Mining Privacy Goals from Privacy Policies Using Hybridized Task Recomposition., , and . ACM Trans. Softw. Eng. Methodol., 25 (3): 22:1-22:24 (2016)The Impact of Assistive Technology on Communication Quality Between Deaf and Hearing Individuals., , , , , , and . CSCW, page 669-682. ACM, (2017)diretto: A Toolkit for Distributed Reporting and Collaboration., , , , and . Mensch & Computer, page 151-160. Oldenbourg Verlag, (2011)Keeping a Low Profile?: Technology, Risk and Privacy among Undocumented Immigrants., , , , , and . CHI, page 114. ACM, (2018)"It Only Tells Me How I Slept, Not How to Fix It": Exploring Sleep Behaviors and Opportunities for Sleep Technology., , , and . iConference, volume 11420 of Lecture Notes in Computer Science, page 754-766. Springer, (2019)Interaction weaknesses of personal navigation devices., , , and . AutomotiveUI, page 129-136. ACM, (2010)Prifi beacons: piggybacking privacy implications on wifi beacons., , and . UbiComp (Adjunct Publication), page 83-86. ACM, (2013)On the Use of Emojis in Mobile Authentication., , , , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 265-280. Springer, (2017)