Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer-it: Stick-on solutions for networks of things., , , , , , and . Pervasive and Mobile Computing, 4 (3): 448-479 (2008)When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices.. HPCC/EUC, page 1579-1584. IEEE, (2013)Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction., , and . UbiComp, volume 4717 of Lecture Notes in Computer Science, page 199-216. Springer, (2007)A Survey of User Interaction for Spontaneous Device Association., , and . ACM Comput. Surv., 47 (1): 8:1-8:40 (2014)The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams.. ESAS, volume 4572 of Lecture Notes in Computer Science, page 1-15. Springer, (2007)Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers., , , and . ARES, page 38:1-38:10. ACM, (2018)Evaluation of Descriptive User Interface Methodologies for Mobile Devices., , and . EUROCAST (2), volume 6928 of Lecture Notes in Computer Science, page 519-526. Springer, (2011)Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel., , , and . MoMM, page 147-156. ACM, (2014)Diversity in locked and unlocked mobile device usage., , , , and . UbiComp Adjunct, page 379-384. ACM, (2014)Air-Writing: a platform for scalable, privacy-preserving, spatial group messaging., , and . iiWAS, page 183-191. ACM, (2010)