Author of the publication

Increasing Security of Mobile Devices by Decreasing User Effort in Verification.

, , , , and . ICSNC, page 80. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Rapid Deployment Solution Prototype for IoT Devices., , and . UCAmI (2), volume 10070 of Lecture Notes in Computer Science, page 275-283. (2016)The internet of things program: the finnish perspective., and . IEEE Commun. Mag., 51 (3): 10-11 (2013)Tag Manager: a mobile phone platform for physical selection services., , and . ICPS, page 405-412. IEEE Computer Society, (2005)A Review of Fingerprint Image Enhancement Methods., , and . Int. J. Image Graph., 3 (3): 401-424 (2003)Experiences from interaction design for NFC applications., , , and . J. Ambient Intell. Smart Environ., 1 (4): 351-364 (2009)A Physical Selection Paradigm for Ubiquitous Computing., , , and . EUSAI, volume 2875 of Lecture Notes in Computer Science, page 372-383. Springer, (2003)From technology prototypes to ethnographic studies: a look to the Ubicomp research directions., and . Mobility Conference, page 2. ACM, (2008)Soft biometrics - combining body weight and fat measurements with fingerprint biometrics., , , , and . Pattern Recognit. Lett., 27 (5): 325-334 (2006)Increasing Security of Mobile Devices by Decreasing User Effort in Verification., , , , and . ICSNC, page 80. IEEE Computer Society, (2007)CAD and Vision in Rangefinder-based Dimensional Metrology.. 3DIM, page 251-261. IEEE Computer Society, (1997)