From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Attacks on Security and Privacy Through a Low-Cost Android Device., и . J. Cyber Secur. Mobil., 4 (2-3): 33-52 (2015)A Protocol For Storage Limitations and Upgrades in Decentralised Networks., и . SIN, стр. 69. ACM, (2014)Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units., , , , и . SIN, стр. 166-173. ACM, (2016)IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't., и . IEEE Consumer Electron. Mag., 5 (2): 79-86 (2016)Organisational Contexts of Energy Cybersecurity., , и . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, том 13106 из Lecture Notes in Computer Science, стр. 384-402. Springer, (2021)Achieving Optional Android Permissions without Operating System Modifications., и . VTC Spring, стр. 1-5. IEEE, (2015)Privacy Implications of Smartphone-Based Connected Vehicle Communications., , и . VTC Fall, стр. 1-3. IEEE, (2015)Privacy Implications of Wearable Health Devices., и . SIN, стр. 117. ACM, (2014)Wearable mobile sensor and communication platform for the in-situ monitoring of lower limb health in amputees., , , , , , и . ISCAS, стр. 1366-1369. IEEE, (2016)A Practical Design and Implementation of a Low Cost Platform for Remote Monitoring of Lower Limb Health of Amputees in the Developing World., , , , , и . IEEE Access, (2016)