Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ayushman: A Wireless Sensor Network Based Health Monitoring Infrastructure and Testbed., , , , , and . DCOSS, volume 3560 of Lecture Notes in Computer Science, page 406-407. Springer, (2005)"I... caught a person casing my house... and scared him off: " The Use of Security-Focused Smart Home Devices by People with Disabilities., , , , and . CHI, page 846:1-846:16. ACM, (2023)Short paper: Establishing trust in a vehicular network., and . VNC, page 194-197. IEEE, (2013)BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body., , and . ICPP Workshops, page 432-. IEEE Computer Society, (2003)Challenges of implementing cyber-physical security solutions in body area networks., , and . BODYNETS, page 18. ICST, (2009)Criticality Aware Access Control Model for Pervasive Applications., , and . PerCom, page 251-257. IEEE Computer Society, (2006)Proximity Based Access Control in Smart-Emergency Departments., , , and . PerCom Workshops, page 512-516. IEEE Computer Society, (2006)Detecting malicious morphological alterations of ECG signals in body sensor networks., and . IPSN, page 342-343. ACM, (2015)A New Authentication Approach for People with Upper Extremity Impairment., , , , and . PerCom Workshops, page 1-6. IEEE, (2020)A honeypot system for wearable networks., , , , and . Sarnoff Symposium, page 199-201. IEEE, (2016)