Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors., , and . Sensors, 18 (4): 1219 (2018)Privacy Models in Wireless Sensor Networks: A Survey., , and . J. Sensors, (2016)Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills., , , and . J. Educ. Technol. Soc., 16 (3): 28-43 (2013)AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps., , and . TrustCom, page 370-379. IEEE Computer Society, (2014)POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations., , , , and . MobiQuitous, volume 104 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 224-227. Springer, (2011)L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols., , , and . DPM/SETOP, volume 6514 of Lecture Notes in Computer Science, page 108-122. Springer, (2010)Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review., , , and . Sensors, 21 (1): 92 (2021)Access Control for the Cloud Based on Multi-device Authentication., , and . TrustCom/BigDataSE/ISPA (1), page 856-863. IEEE, (2015)Characterizing the MasterPrint threat on Android devices with capacitive sensors., , , and . ARES, page 16:1-16:11. ACM, (2023)CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies., , and . ARES, page 363-368. IEEE Computer Society, (2008)