Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Usable Security und Privacy., , and . Datenschutz und Datensicherheit, 34 (11): 773-782 (2010)Timing Attacks on PIN Input in VoIP Networks (Short Paper)., and . DIMVA, volume 6739 of Lecture Notes in Computer Science, page 75-84. Springer, (2011)Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood., , and . ARES, page 39:1-39:9. ACM, (2018)Accountability for cloud and other future Internet services., , , , , , , , , and 3 other author(s). CloudCom, page 629-632. IEEE Computer Society, (2012)Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages., , , and . Quality of Protection, volume 23 of Advances in Information Security, Springer, (2006)Privacy and identity management for everyone., , , , , , , , and . Digital Identity Management, page 20-27. ACM, (2005)Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures., , , and . CHI Extended Abstracts, page 1803-1808. ACM, (2015)Surveillance and Privacy., and . HCC, volume 328 of IFIP Advances in Information and Communication Technology, page 175-177. Springer, (2010)Privacy for Peer Profiling in Collective Adaptive Systems., , , , , , and . Privacy and Identity Management, volume 457 of IFIP Advances in Information and Communication Technology, page 237-252. Springer, (2014)HCI for Policy Display and Administration., , , and . Privacy and Identity Management for Life, Springer, (2011)