Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Position Sharing for Location Privacy in Non-trusted Systems, , and . Proceedings of the 9th IEEE International Conference on Pervasive Computing and Communications (PerCom 2011), Seattle, USA, (March 2011)A classification of location privacy attacks and approaches., , , and . Personal and Ubiquitous Computing, 18 (1): 163-175 (2014)On Designing Resilient Location-Privacy Obfuscators, , and . Computer journal, 58 (10): 2649-2664 (2015)Map-Aware Position Sharing for Location Privacy in Non-trusted Systems., , and . Pervasive, volume 7319 of Lecture Notes in Computer Science, page 388-405. Springer, (2012)Optimized Secure Position Sharing with Non-trusted Servers, , , and . arXiv.org, (February 2017)Towards a Position Sharing Approach for Location-based Services, , , and . Proceedings of the W3C Workshop on Privacy for Advanced Web APIs, page 1--3. Online, (July 2010)Map-aware Position Sharing for Location Privacy in Non-trusted Systems, , and . Proceedings of the 10th International Conference on Pervasive Computing (Pervasive 2012), page 388--405. Newcastle, UK, (June 2012)Optimizing Maintenance Cost of P2P Voronoi Overlay Networking, , and . Scientific Papers of Donetsk National Technical University. "Problems of Simulation and Computer Aided Design of Dynamic Systems", (2011)Eco-Efficient Cloud Resource Monitoring and Analysis., , and . ICT4S (Workshops), volume 1203 of CEUR Workshop Proceedings, page 14-17. CEUR-WS.org, (2014)Implementation of Hybrid Cloud Storage Based on CDMI Protocol, , , and . eChallenges e-2015 Conference Proceedings, (November 2015)