Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Resource Adaptation in the DOLMEN Service Machine., , , , , , and . IS&N, volume 1238 of Lecture Notes in Computer Science, page 25-34. Springer, (1997)Computer crime and abuse: A survey of public attitudes and awareness., , , and . Comput. Secur., 18 (8): 715-726 (1999)Integration of Mobility Functions into an Open Service Architecture: The DOLMEN Approach., , , , and . IS&N, volume 1238 of Lecture Notes in Computer Science, page 391-402. Springer, (1997)Dynamically Adapted Streaming of Video for a Real-Time Multimedia Application., , and . ICAS/ICNS, page 50. IEEE Computer Society, (2005)Authentication and Supervision: A Survey of User Attitudes., , , and . Comput. Secur., 19 (6): 529-539 (2000)Strategies for content migration on the World Wide Web., , , , , and . Internet Res., 9 (1): 25-34 (1999)Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets., , , and . SEC, volume 250 of IFIP Conference Proceedings, page 97-108. Kluwer, (2003)Mobility in long-term service architectures and distributed platforms., , , and . IEEE Wirel. Commun., 5 (4): 44-55 (1998)A distributed and cooperative user authentication framework., , , and . IAS, page 304-310. IEEE, (2010)A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head., , and . Comput. Secur., 26 (7-8): 468-478 (2007)