Author of the publication

Attacking Unlinkability: The Importance of Context.

, , and . Privacy Enhancing Technologies, volume 4776 of Lecture Notes in Computer Science, page 1-16. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Hierarchy of Visual Languages., and . VL, page 196-203. IEEE Computer Society, (1996)A constraint extension to scalable vector graphics., , , , , and . WWW, page 489-498. ACM, (2001)A Tale of two Wells: Noise-Induced Adaptiveness in Self-Organized Systems.. SASO, page 435-444. IEEE Computer Society, (2008)A service request description language., and . FORTE, volume 6 of IFIP Conference Proceedings, page 37-52. Chapman & Hall, (1994)Beam-ACO Based on Stochastic Sampling for Makespan Optimization Concerning the TSP with Time Windows., , , , and . EvoCOP, volume 5482 of Lecture Notes in Computer Science, page 97-108. Springer, (2009)Deductive Parsing of Visual Languages., , , and . LACL, volume 2099 of Lecture Notes in Computer Science, page 79-94. Springer, (2001)Integrating ACO and Constraint Propagation., and . ANTS Workshop, volume 3172 of Lecture Notes in Computer Science, page 166-177. Springer, (2004)Attacking Unlinkability: The Importance of Context., , and . Privacy Enhancing Technologies, volume 4776 of Lecture Notes in Computer Science, page 1-16. Springer, (2007)Guest Editor's Introduction., and . J. Vis. Lang. Comput., 10 (4): 313-316 (1999)Zur Trennung von Klassen ununterscheidbarer Ensembles.. Saarland University, Saarbrücken, Germany, (1995)