Author of the publication

Authenticating Public Wireless Networks with Physical Evidence.

, , , , and . WiMob, page 394-399. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How and Why People Use Camera Phones, , , and . Consumer Applications and Systems Laboratory HP Laboratories Bristol, (November 2004)Understanding user engagement with barcoded signs in the 'Coast' location-based experience., and . J. Locat. Based Serv., 1 (4): 256-273 (2007)Distributed Systems: Concepts and Design, , and . Addison-Wesley, Boston, Massachusetts, 2nd edition, (1994)The Myth of the 'Martini Solution'., , , , and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 536-537. Springer, (2004)The worm program model: an application centred point of view for distributed architecture design., and . ACM SIGOPS European Workshop, ACM, (1988)People, places, things: Web presence for the real world., , , , , , , , , and 3 other author(s). WMCSA, page 19-. IEEE Computer Society, (2000)Towards a real-world wide web., and . ACM SIGOPS European Workshop, page 195-200. ACM, (2000)Distributed Systems: Concepts and Design (4th Edition) (International Computer Science Series), , and . Addison Wesley, (May 2005)Validating and Securing Spontaneous Associations between Wireless Devices., and . ISC, volume 2851 of Lecture Notes in Computer Science, page 44-53. Springer, (2003)Verteilte Systeme. Konzepte und Design, , and . Pearson Studium, 3., überarb. A. edition, (2005)