Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Customizable Reputation-based Privacy Assurance System using Active Feedback., and . SecureComm, page 1-8. IEEE, (2006)Security/Trustworthiness Assessment of Platforms., and . Digital Privacy - PRIME, volume 6545 of Lecture Notes in Computer Science, Springer, (2011)Towards privacy-enhanced mobile communities - Architecture, concepts and user trials., , , , , , and . Journal of Systems and Software, 84 (11): 1947-1960 (2011)A configurable protocol architecture for CORBA environments., and . ISADS, page 187-194. IEEE Computer Society, (1997)Similarity-based matching meets Malware Diversity., , , , , and . CoRR, (2014)Introduction: Privacy, Trust, and Identity Management., , and . Digital Privacy - PRIME, volume 6545 of Lecture Notes in Computer Science, Springer, (2011)Privacy Respecting Targeted Advertising for Social Networks., , , and . WISTP, volume 6633 of Lecture Notes in Computer Science, page 361-370. Springer, (2011)Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity., , , , and . NDSS, The Internet Society, (2015)Leakage-Resilient Layout Randomization for Mobile Devices., , , , , , and . NDSS, The Internet Society, (2016)Diversity and information leaks., , , , and . The Continuing Arms Race, ACM / Morgan & Claypool, (2018)