Author of the publication

A Hypergame Analysis for ErsatzPasswords.

, , , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 47-61. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing AES for embedded devices and wireless sensor networks., , and . TRIDENTCOM, page 4. ICST, (2008)Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment., , , , and . IEEE Trans. Knowl. Data Eng., 12 (2): 203-224 (2000)Do specialized distributed frameworks for bioinformatics applications obtain better performance over generic ones?, , , and . BCB, page 538. ACM, (2015)Video through a crystal ball: effect of bandwidth prediction quality on adaptive streaming in mobile environments., , , , and . MoVid@MMSys, page 1:1-1:6. ACM, (2016)Using big data for more dependability: a cellular network tale., , , and . HotDep, page 2:1-2:5. ACM, (2013)Vrisha: using scaling properties of parallel programs for bug detection and localization., , and . HPDC, page 85-96. ACM, (2011)The Effect of Motion on PPG Heart Rate Sensors., , and . DSN (Supplements), page 59-60. IEEE, (2020)Reliability Analysis of Edge Scenarios Using Pedestrian Mobility., , , and . DSN (Supplements), page 61-62. IEEE, (2020)A delay-bounded event-monitoring and adversary-identification protocol in resource-constraint sensor networks., , , and . Ad Hoc Networks, 11 (6): 1820-1835 (2013)An Open Dataset of Sensor Data from Soil Sensors and Weather Stations at Production Farms., , , , , , , and . CoRR, (2023)