Author of the publication

Evaluation of Descriptive User Interface Methodologies for Mobile Devices.

, , and . EUROCAST (2), volume 6928 of Lecture Notes in Computer Science, page 519-526. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and trust in context-aware applications., , and . Personal and Ubiquitous Computing, 18 (1): 115-116 (2014)When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices.. HPCC/EUC, page 1579-1584. IEEE, (2013)Peer-it: Stick-on solutions for networks of things., , , , , , and . Pervasive and Mobile Computing, 4 (3): 448-479 (2008)Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction., , and . UbiComp, volume 4717 of Lecture Notes in Computer Science, page 199-216. Springer, (2007)Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices., and . IEEE Trans. Mob. Comput., 8 (6): 792-806 (2009)Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers., , , and . ARES, page 38:1-38:10. ACM, (2018)Evaluation of Descriptive User Interface Methodologies for Mobile Devices., , and . EUROCAST (2), volume 6928 of Lecture Notes in Computer Science, page 519-526. Springer, (2011)A password-authenticated secure channel for App to Java Card applet communication., , , and . Int. J. Pervasive Computing and Communications, 11 (4): 374-397 (2015)A Survey of User Interaction for Spontaneous Device Association., , and . ACM Comput. Surv., 47 (1): 8:1-8:40 (2014)The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams.. ESAS, volume 4572 of Lecture Notes in Computer Science, page 1-15. Springer, (2007)