Author of the publication

Revocable Anonymity.

, , and . ETRICS, volume 3995 of Lecture Notes in Computer Science, page 206-220. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the Effectiveness of ISO 27001: 2013 Based on Annex A., , and . ARES, page 259-264. IEEE Computer Society, (2014)VANETsim: An open source simulator for security and privacy concepts in VANETs., , , , and . HPCS, page 543-550. IEEE, (2014)PADAVAN: Privacy-Aware Data Accumulation for Vehicular Ad-hoc Networks., , and . WiMob, page 487-493. IEEE Computer Society, (2014)Workload modelling for mix-based anonymity services., , and . Computers & Security, (2015)Sichere und datenschutzgerechte Umsetzung medizinischer Register., , , , and . Datenschutz und Datensicherheit, 43 (8): 507-512 (2019)Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing., , and . CoRR, (2016)Accelerating QUIC's Connection Establishment on High-Latency Access Networks., , , and . CoRR, (2019)Automatically Proving Purpose Limitation in Software Architectures., , , , , , , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 345-358. Springer, (2019)Mind the cache: large-scale explorative study of web caching., , and . SAC, page 2497-2506. ACM, (2019)Detektion von anonym abgerufenen rechtswidrigen Inhalten mit einem hashwertbasierten Datenscanner., and . Sicherheit, volume P-128 of LNI, page 59-70. GI, (2008)