Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Privacy Analysis of Google and Yandex Safe Browsing., , and . DSN, page 347-358. IEEE Computer Society, (2016)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)Distributed Key Certification Using Accumulators for Wireless Sensor Networks., , , and . MobiQuitous, volume 131 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 500-511. Springer, (2013)Analysing the privacy policies of Wi-Fi trackers., , and . WPA@MobiSys, page 39-44. ACM, (2014)Distance Bounding Protocols on TH-UWB Radios., , , , and . GLOBECOM, page 1-6. IEEE, (2010)Parallel Generation of l-Sequences., and . Symmetric Cryptography, volume 09031 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)Matriochka symmetric Boolean functions., and . ISIT, page 1631-1635. IEEE, (2008)Time Distortion Anonymization for the Publication of Mobility Data with High Utility., , , and . CoRR, (2015)Differentially Private Location Privacy in Practice., , , and . CoRR, (2014)A New Approach for FCSRs., , , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 433-448. Springer, (2009)