Author of the publication

Perceptions of Risk in Mobile Transaction.

, , , and . IEEE Symposium on Security and Privacy Workshops, page 214-223. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elements of visual language., and . VL, page 38-44. IEEE Computer Society, (1988)Perceptions of Risk in Mobile Transaction., , , and . IEEE Symposium on Security and Privacy Workshops, page 214-223. IEEE Computer Society, (2016)Security challenges for Enterprise Java in an e-business environment., , , , and . IBM Syst. J., 40 (1): 130-152 (2001)GROOP: An Object-Oriented Toolkit for Animated 3D Graphics., and . OOPSLA, page 309-325. ACM, (1993)SIGPLAN Notices 28(10) / OOPSLA'93, Addendum to the Proceedings: OOPS Messenger 5(2) April 1994.Validating structural properties of nested objects., , , , , , and . OOPSLA Companion, page 294-304. ACM, (2004)Access rights analysis for Java., , and . OOPSLA, page 359-372. ACM, (2002)SIGPLAN Notices 37(11).Automatic detection of immutable fields in Java., , , and . CASCON, page 10. IBM, (2000)Practical out-of-band authentication for mobile applications., and . Middleware (Industry Track), page 3:1-3:6. ACM, (2013)SABER: smart analysis based error reduction., , , , , , , and . ISSTA, page 243-251. ACM, (2004)Biometric authentication on a mobile device: a study of user effort, error and task disruption., , , , , and . ACSAC, page 159-168. ACM, (2012)