Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bezel swipe: conflict-free scrolling and multiple selection on mobile touch screen devices., and . CHI, page 1523-1526. ACM, (2009)A Scalable and Secure Global Tracking Service for Mobile Agents., and . Mobile Agents, volume 2240 of Lecture Notes in Computer Science, page 169-181. Springer, (2001)POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties., , and . ACM Conference on Computer and Communications Security, page 1796-1798. ACM, (2016)POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems., , , and . ACM Conference on Computer and Communications Security, page 1823-1825. ACM, (2016)Learning Extremal Representations with Deep Archetypal Analysis., , , , and . CoRR, (2020)Can Software Licenses Contribute to Cyberarms Control?, and . NSPW, page 41-51. ACM, (2018)FlexCOS: An Open Smartcard Platform for Research and Education., and . NSS, volume 7645 of Lecture Notes in Computer Science, page 277-290. Springer, (2012)Information Theoretic Causal Effect Quantification., and . Entropy, 21 (10): 975 (2019)27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University., , , , and . SP, page 860-875. IEEE, (2022)Learning Conditional Invariance Through Cycle Consistency., , , , , and . GCPR, volume 13024 of Lecture Notes in Computer Science, page 376-391. Springer, (2021)