Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications., , , , , , , , , and 7 other author(s). CAV, volume 3576 of Lecture Notes in Computer Science, page 281-285. Springer, (2005)The ASW Protocol Revisited: A Unified View., and . Electron. Notes Theor. Comput. Sci., 125 (1): 145-161 (2005)Locaccino: a privacy-centric location sharing application., , , , , , , and . UbiComp (Adjunct Papers), page 381-382. ACM, (2010)User-controllable learning of security and privacy policies., , , and . AISec, page 11-18. ACM, (2008)Analyzing use of privacy policy attributes in a location sharing application., , , , , , , and . SOUPS, ACM, (2009)Formalizing and Analyzing Sender Invariance., , , and . Formal Aspects in Security and Trust, volume 4691 of Lecture Notes in Computer Science, page 80-95. Springer, (2006)Empirical models of privacy in location sharing., , , , , , , , and . UbiComp, page 129-138. ACM, (2010)The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing., , , , , , and . SOUPS, ACM, (2009)Who's viewed you?: the impact of feedback in a mobile location-sharing application., , , , , and . CHI, page 2003-2012. ACM, (2009)A Formalization of Off-Line Guessing for Security Protocol Analysis., , and . LPAR, volume 3452 of Lecture Notes in Computer Science, page 363-379. Springer, (2004)