Author of the publication

Perils of Zero-Interaction Security in the Internet of Things.

, , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (1): 10:1-10:38 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Emulation of dynamic adaptive streaming over HTTP with Mininet., , , and . FRUCT, page 391-396. IEEE, (2016)Results for scheme by Miettinen et al. from "Perils of Zero-Interaction Security in the Internet of Things"., , , , and . (January 2019)Results for scheme by Schürmann and Sigg from "Perils of Zero-Interaction Security in the Internet of Things"., , , , and . (January 2019)Raw data from Office scenario from "Perils of Zero-Interaction Security in the Internet of Things"., , , , and . (January 2019)Results for scheme by Truong et al. from "Perils of Zero-Interaction Security in the Internet of Things"., , , , and . (January 2019)Processed data from Mobile scenario from "Perils of Zero-Interaction Security in the Internet of Things"., , , , and . (January 2019)Survey and Systematization of Secure Device Pairing., , , , and . IEEE Commun. Surv. Tutorials, 20 (1): 517-550 (2018)A Path to Holistic Privacy in Stream Processing Systems.. MobiSys, page 627-628. ACM, (2023)Raw data from Car scenario from "Perils of Zero-Interaction Security in the Internet of Things"., , , , and . (January 2019)Index of Supplementary Files from "Next2You: Robust Copresence Detection Based on Channel State Information"., , , , , and . (July 2021)