Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ephemeral Communication and Communication Places - What Influences College-Aged Negotiation of Instant Messaging Usage Within App Ecosystems?, , and . iConference, volume 10766 of Lecture Notes in Computer Science, page 132-138. Springer, (2018)Traust: A Trust Negotiation Based Authorization Service., , , and . iTrust, volume 3986 of Lecture Notes in Computer Science, page 458-462. Springer, (2006)16th Workshop on Privacy in the Electronic Society (WPES 2017).. CCS, page 2643-2644. ACM, (2017)TPRIVEXEC: Private Execution in Virtual Memory., , and . CODASPY, page 285-294. ACM, (2016)Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007)., and . SIGMOD Rec., 37 (1): 56-58 (2008)Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems., , and . DBSec, volume 12122 of Lecture Notes in Computer Science, page 118-136. Springer, (2020)Improving Medication Adherence Behaviors Through Personalized, Technology-Powered Interventions., , and . IUI Workshops, volume 2903 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Policy Administration in Tag-Based Authorization., , , , and . FPS, volume 7743 of Lecture Notes in Computer Science, page 162-179. Springer, (2012)Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback., , , , and . CHI, page 1415-1418. ACM, (2015)"Check out where I am!": location-sharing motivations, preferences, and practices., , , and . CHI Extended Abstracts, page 1997-2002. ACM, (2012)