Author of the publication

Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors.

, , , , and . CoRR, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A type system with usage aspects., , and . J. Funct. Program., 18 (2): 141-178 (2008)On the Formalisation of Σ-Protocols and Commitment Schemes., , and . POST, volume 11426 of Lecture Notes in Computer Science, page 175-196. Springer, (2019)Associative memories in large computer systems and An integrated associateve memory matrix., , and . IFIP Congress (2), page 796-800. (1968)Addressing Magnetic Tape on the Atlas 1 Computing Machine., , and . Comput. J., 8 (4): 323-329 (1966)Multi-Party Computation., and . Archive of Formal Proofs, (2019)Polar: A Framework for Proof Refactoring., , and . LPAR, volume 8312 of Lecture Notes in Computer Science, page 776-791. Springer, (2013)Probing Attacks on Multi-Agent Systems Using Electronic Institutions., , and . DALT, volume 7169 of Lecture Notes in Computer Science, page 33-50. Springer, (2011)Towards an amortized type system for JavaScript., and . SCSS, volume 30 of EPiC Series in Computing, page 12-26. EasyChair, (2014)Subtyping with Power Types.. CSL, volume 1862 of Lecture Notes in Computer Science, page 156-171. Springer, (2000)Safety Guarantees from Explicit Resource Management., , and . FMCO, volume 5382 of Lecture Notes in Computer Science, page 52-71. Springer, (2007)