Author of the publication

Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern.

, , , , and . CNSR, page 157-165. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Issues in Ubiquitous Computing.. Handbook of Ambient Intelligence and Smart Environments, Springer, (2010)Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper)., , and . ICUCT, volume 4412 of Lecture Notes in Computer Science, page 263-272. Springer, (2006)How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort)., , and . Security Protocols Workshop, volume 7114 of Lecture Notes in Computer Science, page 359-367. Springer, (2011)Multi-channel Protocols., and . Security Protocols Workshop, volume 4631 of Lecture Notes in Computer Science, page 112-127. Springer, (2005)Cyberdice: Peer-to-Peer Gambling in the Presence of Cheaters., and . Security Protocols Workshop, volume 6615 of Lecture Notes in Computer Science, page 54-70. Springer, (2008)User Authentication for the Internet of Things., and . Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 209-213. Springer, (2018)Red Button and Yellow Button: Usable Security for Lost Security Tokens., , , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 165-171. Springer, (2016)Relay-Proof Channels Using UWB Lasers., , , and . Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 45-46. Springer, (2010)It's the Anthropology, Stupid!, and . Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 127-130. Springer, (2010)Privacy stories: confidence in privacy behaviors through end user programming., , , and . SOUPS, ACM, (2009)