Author of the publication

Pico Without Public Keys.

, , , , , , and . Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 195-211. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper)., , and . ICUCT, volume 4412 of Lecture Notes in Computer Science, page 263-272. Springer, (2006)Security Issues in Ubiquitous Computing.. Handbook of Ambient Intelligence and Smart Environments, Springer, (2010)Relay-Proof Channels Using UWB Lasers., , , and . Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 45-46. Springer, (2010)IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland's Footsteps., and . IEEE Secur. Priv., 18 (3): 6-7 (2020)Multi-channel Protocols., and . Security Protocols Workshop, volume 4631 of Lecture Notes in Computer Science, page 112-127. Springer, (2005)Python in Education: Raising a Generation of Native Speakers. Proceedings of 8$^th$ International Python Conference, (January 2000)http://www.python.org/workshops/2000-01/proceedings/ papers/stajano/stajano.html http://www.uk.research.att.com/~fms/ http://www.uk.research.att.com/ papers/tr.1999.10.html.User Authentication for the Internet of Things., and . Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 209-213. Springer, (2018)Red Button and Yellow Button: Usable Security for Lost Security Tokens., , , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 165-171. Springer, (2016)It's the Anthropology, Stupid!, and . Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 127-130. Springer, (2010)Taming the Complexity of Distributed Multimedia Applications., and . Tcl/Tk Workshop, USENIX Association, (1995)