Author of the publication

WYK: Mobile Device Authentication Using the User's Address Book.

, , and . ETAA, volume 13136 of Lecture Notes in Computer Science, page 1-16. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cybersecurity and Safety Co-Engineering of Cyberphysical Systems - A Comprehensive Survey., , and . Future Internet, 12 (4): 65 (2020)A Systematic Literature Review on Military Software Defined Networks., , and . Future Internet, 10 (9): 88 (2018)Risk Perceptions on Social Media Use in Norway., , and . Future Internet, 12 (12): 211 (2020)A Systematic Review on Social Robots in Public Spaces: Threat Landscape and Attack Surface., , , , and . Comput., 11 (12): 181 (2022)Communication and Cybersecurity Testbed for Autonomous Passenger Ship., and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 5-22. Springer, (2021)Dynamic setup of IPsec VPNs in service function chaining., , and . Comput. Networks, (2019)User Modelling Validation over the Security Awareness of Digital Natives., , and . Future Internet, 9 (3): 32 (2017)RESPOnSE - A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments., , , , and . Sensors, 20 (10): 2960 (2020)Navigation Data Anomaly Analysis and Detection., , , and . Inf., 13 (3): 104 (2022)A systematic literature review on wireless security testbeds in the cyber-physical realm., , and . Comput. Secur., (October 2023)