Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recommendation on the Use of Biometric Technology.. Security and Privacy in Biometrics, Springer, (2013)Security Issues in Mobile Commerce Using WAP., and . Bled eConference, page 36. (2002)The Security Hole in WAP: An Analysis of the Network and Business Rationales Underlying a Failure., and . Int. J. Electron. Commer., 7 (4): 73-92 (2003)3rd Workshop on Mobility and Replication., , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 307-308. Springer, (1998)Comprehensive, Concurrent, and Robust Garbage Collection in the Distributed, Object-Based System, Emerald. University of Copenhagen, Department of Computer Science, (1993)DIKU-rapport 93/1.Digital Wheel Barrows In Local Government., and . Bled eConference, page 11. (2004)Mirage+: A Kernel Implementation of Distributed Shared Memory on a Network of Personal Computers., , and . Softw. Pract. Exp., 24 (10): 887-909 (1994)Commercial E-Commerce Servers and Enterprise Application Integration: A Case-based Comparison of Net.Commerce and Site Server Commerce., and . HICSS, IEEE Computer Society, (2001)Security Issues in Mobile Commerce Using WAP., and . Bled eConference, page 36. (2002)Electronic Commerce in Denmark: The Spread of EDI in Business-to-Business Transactions., , and . USENIX Workshop on Electronic Commerce, USENIX Association, (1998)