Author of the publication

Incorporating entrepreneurship topic into a mobile computing course.

, and . FIE, page 1-6. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Image Choices on the Usability and Security of Click Based Graphical Passwords., , and . ISVC (2), volume 5876 of Lecture Notes in Computer Science, page 889-898. Springer, (2009)Measuring the Complexity of Computer Security Visualization Designs., , and . VizSEC, page 53-66. Springer, (2007)A Task Centered Framework for Computer Security Data Visualization., , and . VizSEC, volume 5210 of Lecture Notes in Computer Science, page 87-94. Springer, (2008)The Precise 3D Reconstruction of Human Faces Based on 2D Photograph.. CCWC, page 1185-1190. IEEE, (2023)A Visual Data Exploration Framework for Complex Problem Solving Based on Extended Cognitive Fit Theory., , and . ISVC (2), volume 5876 of Lecture Notes in Computer Science, page 869-878. Springer, (2009)Analysis and Design of Graphical Password Techniques., , and . ISVC (2), volume 4292 of Lecture Notes in Computer Science, page 741-749. Springer, (2006)3-540-48628-3.A Survey of Teaching PDC Content in Undergraduate Curriculum., , , , and . CCWC, page 1306-1312. IEEE, (2021)Incorporating entrepreneurship topic into a mobile computing course., and . FIE, page 1-6. IEEE Computer Society, (2014)Graphical Passwords: A Survey., , and . ACSAC, page 463-472. IEEE Computer Society, (2005)A Study of Graphical Password for Mobile Devices.. MobiCASE, volume 130 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 202-214. Springer, (2013)