Author of the publication

Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units.

, , , , and . SIN, page 166-173. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Attacks on Security and Privacy Through a Low-Cost Android Device., and . J. Cyber Secur. Mobil., 4 (2-3): 33-52 (2015)A Protocol For Storage Limitations and Upgrades in Decentralised Networks., and . SIN, page 69. ACM, (2014)Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units., , , , and . SIN, page 166-173. ACM, (2016)IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't., and . IEEE Consumer Electron. Mag., 5 (2): 79-86 (2016)Organisational Contexts of Energy Cybersecurity., , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 384-402. Springer, (2021)Privacy Implications of Smartphone-Based Connected Vehicle Communications., , and . VTC Fall, page 1-3. IEEE, (2015)Achieving Optional Android Permissions without Operating System Modifications., and . VTC Spring, page 1-5. IEEE, (2015)Privacy Implications of Wearable Health Devices., and . SIN, page 117. ACM, (2014)Wearable mobile sensor and communication platform for the in-situ monitoring of lower limb health in amputees., , , , , , and . ISCAS, page 1366-1369. IEEE, (2016)A Practical Design and Implementation of a Low Cost Platform for Remote Monitoring of Lower Limb Health of Amputees in the Developing World., , , , , and . IEEE Access, (2016)