Author of the publication

An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010: 2011.

, , , , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 65-76. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diseño de una Arquitectura para la Solucion de la Ecuacion de Schroedinger usando el Metodo de Numerov, , and . CoRR, (2011)Functional Verification of DMA Controllers., , , , , , and . J. Electron. Test., 27 (4): 505-516 (2011)Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption., and . IEEE Trans. Circuits Syst. I Regul. Pap., 67-I (7): 2331-2344 (2020)Design of an elliptic curve cryptoprocessor using optimal normal basis over GF(2233)., , and . LASCAS, page 1-4. IEEE, (2013)Hardware design of an eigensolver based on the QR method., , and . LASCAS, page 1-4. IEEE, (2013)Software-Based Self-Test Strategy for Data Cache Memories Embedded in SoCs., , , , and . DDECS, page 339-344. IEEE Computer Society, (2008)On-Line BIST for Testing Analog Circuits., , and . ICCD, page 330-. IEEE Computer Society, (1999)Fault Detection for Linear Analog Circuits Using Current Injection., , and . DATE, page 987-988. IEEE Computer Society, (1998)Hardware implementation of FFT-based spectrum sensing techniques for cognitive radio., , and . LASCAS, page 123-126. IEEE, (2016)Embedded system for area measurement using FPGA., , and . LASCAS, page 1-4. IEEE, (2014)