Author of the publication

User-Centric Multimedia Information Visualization for Mobile Devices in the Ubiquitous Environment.

, , , , and . KES (1), volume 4251 of Lecture Notes in Computer Science, page 753-762. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extensible Security Architecture for Java., , , and . SOSP, page 116-128. ACM, (1997)Operating System Review 31(5).Security Keys: Practical Cryptographic Second Factors for the Modern Web., , , , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 422-440. Springer, (2016)Protected Login., and . Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, page 44-52. Springer, (2012)Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation., , and . RFC, (October 2018)Building an Encrypted and Searchable Audit Log., , , and . NDSS, The Internet Society, (2004)A reference architecture supporting hypervideo content for ITV and the internet domain., and . Comput. Graph., 28 (2): 179-191 (2004)Sliding-window self-healing key distribution., , , and . SSRS@CCS, page 82-90. ACM, (2003)Bridging Geospatial Meta-data Standards Towards Distributed Meta-data Information Systems., and . MD, IEEE Computer Society, (1999)Mobile Liquid 2D Scatter Space (ML2DSS)., and . IV, page 494-498. IEEE Computer Society, (2004)A Security Infrastructure for Distributed Java Applications., , and . S&P, page 15-26. IEEE Computer Society, (2000)