Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards., , , , , , , , and . EVT, USENIX Association, (2008)A method for improving mobile authentication using human spatio-temporal behavior., , , and . ISCC, page 305-311. IEEE Computer Society, (2013)Solving the at-most-once problem with nearly optimal effectiveness., and . PODC, page 229-230. ACM, (2011)Towards macroscopic human behavior based authentication for mobile transactions., , and . UbiComp, page 641-642. ACM, (2012)A Location-Based Authentication System Leveraging Smartphones., , , , , and . MDM (1), page 83-88. IEEE Computer Society, (2014)Solving the At-Most-Once Problem with Nearly Optimal Effectiveness., and . ICDCN, volume 7129 of Lecture Notes in Computer Science, page 122-137. Springer, (2012)The Strong At-Most-Once Problem., , and . DISC, volume 7611 of Lecture Notes in Computer Science, page 386-400. Springer, (2012)Solving the at-most-once problem with nearly optimal effectiveness., and . Theor. Comput. Sci., (2013)Automating Voting Terminal Event Log Analysis., , , , , , , and . EVT/WOTE, USENIX Association, (2009)Distributed dynamic channel assignment in wireless networks., , and . ICNC, page 1113-1117. IEEE, (2014)