Author of the publication

Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security.

, , , , , , , , , , , , and . STM, volume 7170 of Lecture Notes in Computer Science, page 28-39. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interpreting Human and Avatar Facial Expressions., , and . INTERACT (1), volume 5726 of Lecture Notes in Computer Science, page 98-110. Springer, (2009)Device Comfort for mobile health information accessibility., , , , and . PST, page 377-380. IEEE Computer Society, (2013)Measuring the human side of virtual reality., , and . VECIMS, page 8-12. IEEE, (2003)How the Web is used to support collaborative writing., and . Behav. Inf. Technol., 22 (4): 245-262 (2003)Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security., , , , , , , , , and 3 other author(s). STM, volume 7170 of Lecture Notes in Computer Science, page 28-39. Springer, (2011)X3D Conformance Testing Factors in Creating Aviable Test Suite., , and . CCECE, page 2436-2440. IEEE, (2006)Student Modelling in Hybrid Training Systems., , , , and . HCI (2), page 754-759. Elsevier, (1993)0-444-89540-X.Binding external interactivity to X3D., , and . Web3D, page 109-112. ACM, (2007)Sharing vocabularies: tag usage in CiteULike., and . BCS HCI (2), page 71-74. BCS, (2008)Encouraging second thoughts: Obstructive user interfaces for raising security awareness., , , , , , , and . PST, page 366-368. IEEE Computer Society, (2013)