Author of the publication

Active Authentication for Pervasive Computing Environments.

, , , and . ISSS, volume 2609 of Lecture Notes in Computer Science, page 28-41. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective implementation of the cell broadband engineTM isolation loader., , , and . ACM Conference on Computer and Communications Security, page 303-313. ACM, (2009)Robust and efficient polygon overlay on parallel stream processors., , , and . SIGSPATIAL/GIS, page 294-303. ACM, (2013)Dependable TCB Based on the Cell Broadband Engine Isolation Facility., and . RTCSA (1), page 360-370. IEEE Computer Society, (2011)Automatic Resource Scheduling with Latency Hiding for Parallel Stencil Applications on GPGPU Clusters., , , , , and . IPDPS, page 544-556. IEEE Computer Society, (2012)Eliminating Cell Broadband EngineTM DMA Buffer Overflows.. IEICE Trans. Inf. Syst., 93-D (5): 1062-1069 (2010)A parallel programming framework orchestrating multiple languages and architectures., , , , , and . Conf. Computing Frontiers, page 22. ACM, (2011)Anonymity-Aware Face-to-Face Mobile Payment., , and . MobiQuitous, volume 73 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 198-209. Springer, (2010)A zero-stop authentication system for sensor-based embedded real-time applications., , , and . J. Embed. Comput., 1 (1): 119-132 (2005)Active Authentication for Pervasive Computing Environments., , , and . ISSS, volume 2609 of Lecture Notes in Computer Science, page 28-41. Springer, (2002)Zero-Stop Authentication: Sensor-Based Real-Time Authentication System., , , and . RTCSA, volume 2968 of Lecture Notes in Computer Science, page 296-311. Springer, (2003)