Author of the publication

Security, Trust, and Privacy in Mobile Computing Environments.

, , , , and . Mobile Computing Handbook, CRC Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-layer analysis for detecting wireless misbehavior., , and . CCNC, page 6-9. IEEE, (2006)Trust in Pervasive Computing., , , , and . The Handbook of Mobile Middleware, Auerbach Publications/CRC, (2006)Creating an enhanced reality user interface - ERSolitaire., and . CHI Extended Abstracts, page 958-959. ACM, (2003)Supporting new product development with the Internet., , and . Ind. Manag. Data Syst., 100 (6): 277-284 (2000)Threshold-based intrusion detection in ad hoc networks and secure AODV., , , , , and . Ad Hoc Networks, 6 (4): 578-599 (2008)Secure Routing and Intrusion Detection in Ad Hoc Networks., , , , and . PerCom, page 191-199. IEEE Computer Society, (2005)Image processing and vision for interaction and UX.. CHI Extended Abstracts, page 1033-1034. ACM, (2014)HTML5 game development.. CHI Extended Abstracts, page 1011-1012. ACM, (2014)Security, Trust, and Privacy in Mobile Computing Environments., , , , and . Mobile Computing Handbook, CRC Press, (2004)Signature verification Using Stroke Histograms., and . IC-AI, page 87-90. CSREA Press, (2002)