Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards context adaptive privacy decisions in ubiquitous computing., , , and . PerCom Workshops, page 407-410. IEEE Computer Society, (2012)Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations., , , , , , , , , and 1 other author(s). TWEB, 13 (1): 1:1-1:29 (2019)We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy., , , , , and . CoRR, (2018)Dynamic privacy adaptation in ubiquitous computing.. University of Ulm, (2014)Mining Privacy Goals from Privacy Policies Using Hybridized Task Recomposition., , and . ACM Trans. Softw. Eng. Methodol., 25 (3): 22:1-22:24 (2016)The Impact of Assistive Technology on Communication Quality Between Deaf and Hearing Individuals., , , , , , and . CSCW, page 669-682. ACM, (2017)A VANET-based emergency vehicle warning system., , , and . VNC, page 1-8. IEEE, (2009)Privacy Requirements in Vehicular Communication Systems., , and . CSE (3), page 139-145. IEEE Computer Society, (2009)Keeping a Low Profile?: Technology, Risk and Privacy among Undocumented Immigrants., , , , , and . CHI, page 114. ACM, (2018)diretto: A Toolkit for Distributed Reporting and Collaboration., , , , and . Mensch & Computer, page 151-160. Oldenbourg Verlag, (2011)