Author of the publication

Exploring Internet Security Perceptions and Practices in Urban Ghana.

, , and . SOUPS, page 129-142. USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Michael Beltle University of Stuttgart

Measurement and Simulation of the Shielding Effectiveness of Planar Material with Apertures using a ASTM D4935 TEM Cell, , and . 2023 International Symposium on Electromagnetic Compatibility : EMC Europe, IEEE, (2023)
Measurement and Simulation of the Shielding Effectiveness of Planar Material with Apertures using a ASTM D4935 TEM Cell, , and . 2023 International Symposium on Electromagnetic Compatibility : EMC Europe, IEEE, (2023)Using capacitive electric field sensors to measure transient overvoltages : a case study, , , , and . 23rd International Symposium on High Voltage Engineering (ISH 2023), page 20-25. Stevenage, Institution of Engineering and Technology, (2023)Measurement System for Surface Potentials in Realistic HVDC-GIS Environments, , , and . 23rd International Symposium on High Voltage Engineering (ISH 2023), page 543-547. Stevenage, Institution of Engineering and Technology, (2023)
 

Other publications of authors with the same name

ELMR: efficient lightweight mobile records., , , and . MobiHeld, page 69-70. ACM, (2009)Epothecary: cost-effective drug pedigree tracking and authentication using mobile phones., , and . MobiHeld, page 13-18. ACM, (2009)Hermes: data transmission over unknown voice channels., , , , , , and . MobiCom, page 113-124. ACM, (2010)Gotta catch 'em all!: innoculous: enabling epidemiology of computer viruses in the developing world.. NSDR, page 51-56. ACM, (2011)The case for SmartTrack., , , , , , , , , and . ICTD, page 458-467. IEEE, (2009)Exploring Internet Security Perceptions and Practices in Urban Ghana., , and . SOUPS, page 129-142. USENIX Association, (2014)Signet: low-cost auditable transactions using SIMs and mobile phones., and . Operating Systems Review, 43 (4): 73-78 (2009)Stragglers of the herd get eaten: security concerns for GSM mobile banking applications.. HotMobile, page 54-59. ACM, (2010)Blacknoise: lightweight low-fi steganography in defense of free speech.. ACM DEV (4), page 10:1-10:10. ACM, (2013)A biometric attendance terminal and its application to health programs in India., , , , , , , and . NSDR, page 4. ACM, (2010)