Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An analysis of security threats to mobile IPv6., and . IJIPT, 3 (2): 107-118 (2008)Private Pooling: A Privacy-Preserving Approach for Mobile Collaborative Sensing., , and . MobiSec, volume 94 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 52-63. Springer, (2011)An Analysis of Query Forwarding Strategies for Secure and Privacy-Preserving Social Networks., , and . ASONAM, page 535-542. IEEE Computer Society, (2012)Vegas - A Secure and Privacy-Preserving Peer-to-Peer Online Social Network., , and . SocialCom/PASSAT, page 868-874. IEEE Computer Society, (2012)Re-Socializing Online Social Networks., , and . GreenCom/CPSCom, page 786-791. IEEE Computer Society, (2010)Distributed group and rights management for mobile ad hoc networks., , , and . WMNC, page 1-8. IEEE, (2011)Sicherheit und Privatsphäre in Online Sozialen Netzwerken.. Ludwig Maximilians University Munich, (2014)A Privacy-Preserving Social P2P Infrastructure for People-Centric Sensing., and . KiVS, volume 17 of OASIcs, page 176-181. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, (2011)Two-Dimensional Folding of Polypeptides into Molecular Nanostructures at Surfaces, , , , , , , , , and . ACS nano, 11 (3): 2420-2427 (2017)Secure and Privacy-Preserving Cross-Layer Advertising of Location-Based Social Network Services., , , and . MobiCASE, volume 95 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 331-337. Springer, (2011)