Author of the publication

Understanding and minimizing identity exposure in ubiquitous computing environments.

, , , , and . MobiQuitous, page 1-10. ICST / IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments., , , and . IJISP, 4 (4): 1-20 (2010)Expert Sources in Warnings May Reduce the Extent of Identity Disclosure in Cyber Contexts., , , and . Int. J. Hum. Comput. Interaction, 33 (3): 215-228 (2017)Reciprocity attacks., , , and . SOUPS, page 9. ACM, (2011)Studying team shared mental models., , , , , , and . ICPW, volume 363 of ACM International Conference Proceeding Series, page 41-48. ACM, (2008)Contexts and sharing/not sharing private information., , and . ACM Southeast Regional Conference, page 292-297. ACM, (2012)Is older, wiser?: an age-specific study of exposure of private information., , and . ACM Southeast Regional Conference, page 30-35. ACM, (2012)Designing Warnings to Reduce Identity Disclosure., , , , and . Int. J. Hum. Comput. Interaction, 34 (11): 1077-1084 (2018)Understanding identity exposure in pervasive computing environments., , and . Pervasive and Mobile Computing, 8 (5): 777-794 (2012)Understanding and minimizing identity exposure in ubiquitous computing environments., , , , and . MobiQuitous, page 1-10. ICST / IEEE, (2009)