Author of the publication

On Structural Identification of 2D Regression Functions for Indoor Bluetooth Localization.

, , , , and . EUROCAST, volume 5717 of Lecture Notes in Computer Science, page 801-808. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and trust in context-aware applications., , and . Personal and Ubiquitous Computing, 18 (1): 115-116 (2014)Peer-it: Stick-on solutions for networks of things., , , , , , and . Pervasive and Mobile Computing, 4 (3): 448-479 (2008)When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices.. HPCC/EUC, page 1579-1584. IEEE, (2013)Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction., , and . UbiComp, volume 4717 of Lecture Notes in Computer Science, page 199-216. Springer, (2007)Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices., and . IEEE Trans. Mob. Comput., 8 (6): 792-806 (2009)The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams.. ESAS, volume 4572 of Lecture Notes in Computer Science, page 1-15. Springer, (2007)Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers., , , and . ARES, page 38:1-38:10. ACM, (2018)A password-authenticated secure channel for App to Java Card applet communication., , , and . Int. J. Pervasive Computing and Communications, 11 (4): 374-397 (2015)A Survey of User Interaction for Spontaneous Device Association., , and . ACM Comput. Surv., 47 (1): 8:1-8:40 (2014)Air-Writing: a platform for scalable, privacy-preserving, spatial group messaging., , and . iiWAS, page 183-191. ACM, (2010)